id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2013:1868
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: integer underflow when handling trapezoids
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:7472
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
QEMU: fdc: heap buffer overflow in DMA read data transfers libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service libguestfs: Buffer overflow in get_keys leads to DoS swtpm: Unchecked header size indicator against expected size
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2023:7676
Red Hat Security Advisory: Red Hat Data Grid 8.4.6 security update
hotrod-client: Hot Rod client does not enable hostname validation when using TLS that lead to a MITM attack infinispan: Credentials returned from configuration as clear text jose4j: Insecure iteration count setting
[ "cpe:/a:redhat:jboss_data_grid:8" ]
null
6.8
null
null
RHSA-2015:1713
Red Hat Security Advisory: rhev-hypervisor security, bug fix, and enhancement update
jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012) jasper: heap overflow in jp2_decode() (oCERT-2014-012) RHEV-M: webadmin automatic logout fails if VM is selected spice: memory corruption in worker_update_monitors_config()
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2014:0926
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() xen: Hypervisor heap contents leaked to guests (xsa-100)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:2552
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding
[ "cpe:/a:redhat:openshift_application_runtimes:1.0::el7" ]
null
null
8.1
null
RHSA-2002:295
Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2014:0827
Red Hat Security Advisory: tomcat security update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2021:3044
Red Hat Security Advisory: kpatch-patch security update
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2016:0511
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2004:259
Red Hat Security Advisory: samba security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2019:2237
Red Hat Security Advisory: nss, nss-softokn, nss-util, and nspr security, bug fix, and enhancement update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Cache side-channel variant of the Bleichenbacher attack nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2012:0532
Red Hat Security Advisory: nss security update
Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 5.6 Extended Update Support The Red Hat Security Response Team has rated this update as having important security impact.
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2010:0893
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd4: bug in read_buf
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2005:152
Red Hat Security Advisory: postfix security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:2908
Red Hat Security Advisory: rh-nodejs6-nodejs security update
nodejs: Constant Hashtable Seeds vulnerability c-ares: NAPTR parser out of bounds access
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
6.5
null
RHSA-2019:1891
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: nfs: use-after-free in svc_process_common() kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
7
8.8
null
RHSA-2023:4313
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining.
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.2
null
null
RHSA-2018:3432
Red Hat Security Advisory: glusterfs security and bug fix update
glusterfs: glusterfs server exploitable via symlinks to relative paths glusterfs: Buffer overflow in "features/locks" translator allows for denial of service glusterfs: Heap-based buffer overflow via "gf_getspec_req" RPC message glusterfs: "features/index" translator can create arbitrary, empty files glusterfs: Unlimited file creation via "GF_XATTR_IOSTATS_DUMP_KEY" xattr allows for denial of service glusterfs: Repeat use of "GF_META_LOCK_KEY" xattr allows for memory exhaustion glusterfs: features/locks translator passes an user-controlled string to snprintf without a proper format string resulting in a denial of service
[ "cpe:/a:redhat:storage:3.4:server:el7", "cpe:/a:redhat:storage:3:client:el7", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2020:0006
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations
[ "cpe:/a:redhat:network_satellite:5.8::el6" ]
null
null
8.4
null
RHSA-2019:3436
Red Hat Security Advisory: httpd:2.4 security and bug fix update
httpd: mod_auth_digest: access control bypass due to race condition httpd: URL normalization inconsistency
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
3.3
null
RHSA-2023:0709
Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps
[ "cpe:/a:redhat:openshift_serverless:1.27::el8" ]
null
6.5
null
null
RHSA-2019:0365
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 for RHEL 7 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
5.3
null
RHSA-2023:5928
Red Hat Security Advisory: tomcat security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2004:166
Red Hat Security Advisory: : Updated kernel packages resolve security vulnerabilities
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2023:0087
Red Hat Security Advisory: usbguard security update
usbguard: Fix unauthorized access via D-Bus
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2013:0121
Red Hat Security Advisory: mysql security and bug fix update
mysql: regression of CVE-2009-4030
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2010:0882
Red Hat Security Advisory: kernel security and bug fix update
kernel: gdth: Prevent negative offsets in ioctl kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: e1000 issue reported at 26c3 kernel: ipv6: skb is unexpectedly freed kernel: mm: keep a guard page below a grow-down stack segment kernel: 64-bit Compatibility Mode Stack Pointer Underflow
[ "cpe:/o:redhat:rhel_els:3::as", "cpe:/o:redhat:rhel_els:3::es" ]
null
null
null
null
RHSA-2015:0989
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2016:1654
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
3.4
null
RHSA-2004:047
Red Hat Security Advisory: pwlib security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:1584
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7
null
null
RHSA-2020:2832
Red Hat Security Advisory: kernel security and bug fix update
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
5.3
null
null
RHSA-2023:1572
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2016:1776
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) OpenJDK: missing entity replacement limits (JAXP, 8149962) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) OpenJDK: insufficient bytecode verification (Hotspot, 8155981)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2024:0539
Red Hat Security Advisory: tomcat security update
tomcat: HTTP request smuggling via malformed trailer headers
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2007:1114
Red Hat Security Advisory: samba security and bug fix update
samba: send_mailslot() buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2017:3455
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
5.5
null
RHSA-2024:8120
Red Hat Security Advisory: java-11-openjdk security update
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/o:redhat:rhel_els:7" ]
null
4.8
null
null
RHSA-2024:11570
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.5 Security update
undertow: information leakage via HTTP/2 request header reuse hornetq-core-client: Arbitrarily overwrite files or access sensitive information
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
7.1
null
null
RHSA-2022:5754
Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
7.5
null
null
RHSA-2021:1189
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.4
null
null
RHSA-2018:3800
Red Hat Security Advisory: rh-git218-git security update
git: Improper handling of PATH allows for commands to be executed from the current directory
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2024:1920
Red Hat Security Advisory: sssd security update
sssd: Race condition during authorization leads to GPO policies functioning inconsistently
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.1
null
null
RHSA-2022:1793
Red Hat Security Advisory: container-tools:3.0 security and bug fix update
crun: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2024:11299
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2022:1076
Red Hat Security Advisory: openssl security update
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
[ "cpe:/o:redhat:rhel_aus:7.4::server" ]
null
7.5
null
null
RHSA-2018:0116
Red Hat Security Advisory: rh-eclipse46-jackson-databind security update
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
RHSA-2024:6360
Red Hat Security Advisory: libtiff security update
libtiff: NULL pointer dereference in tif_dirinfo.c
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
RHSA-2022:1476
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes
cached-path-relative: Prototype Pollution via the cache variable nanoid: Information disclosure via valueOf() function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic nodejs-shelljs: improper privilege management follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path golang: crash in a golang.org/x/crypto/ssh server
[ "cpe:/a:redhat:acm:2.4::el8" ]
null
7.5
null
null
RHSA-2005:480
Red Hat Security Advisory: ImageMagick security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:7256
Red Hat Security Advisory: dotnet7.0 security update
dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2017:2649
Red Hat Security Advisory: instack-undercloud security, bug fix, and enhancement update
instack-undercloud: uses hardcoded /tmp paths
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.1
null
RHSA-2014:0029
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.0 update
Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler PicketBox: Insecure storage of masked passwords HawtJNI: predictable temporary file name leading to local arbitrary code execution JSF2: Multiple Information Disclosure flaws due to unsafe path traversal JGroups: Authentication via cached credentials Solr: directory traversal when loading XSL stylesheets and Velocity templates Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler Solr: XML eXternal Entity (XXE) flaw in DocumentAnalysisRequestHandler
[ "cpe:/a:redhat:jboss_data_grid:6.2.0" ]
null
null
null
null
RHSA-2022:6173
Red Hat Security Advisory: rsync security update
rsync: remote arbitrary files write inside the directories of connecting peers
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.4
null
null
RHSA-2018:1606
Red Hat Security Advisory: sensu security update
sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections
[ "cpe:/a:redhat:openstack-optools:10::el7" ]
null
null
5.5
null
RHBA-2023:1321
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.58 packages update
haproxy: segfault DoS
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
4.3
null
null
RHSA-2008:0519
Red Hat Security Advisory: kernel security and bug fix update
kernel: linux x86_64 ia32 emulation leaks uninitialized data kernel: dccp: sanity check feature length kernel: [x86_64] The string instruction version didn't zero the output on exception.
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2008:0180
Red Hat Security Advisory: krb5 security update
krb5: double free in gssapi lib krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:0335
Red Hat Security Advisory: kpatch-patch security update
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
5.5
null
null
RHSA-2020:2672
Red Hat Security Advisory: libexif security update
libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
9.1
null
null
RHSA-2023:0245
Red Hat Security Advisory: OpenShift Container Platform 4.11.25 security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2024:1824
Red Hat Security Advisory: OpenJDK 17.0.11 Security Update for Windows Builds
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
3.7
null
null
RHSA-2024:0408
Red Hat Security Advisory: edk2 security update
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
5.3
null
null
RHSA-2024:1267
Red Hat Security Advisory: OpenShift Container Platform 4.12.53 packages and security update
kube-controller-manager: malformed HPA v1 manifest causes crash
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.7
null
null
RHSA-2007:1031
Red Hat Security Advisory: xpdf security update
t1lib font filename string overflow CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2014:1507
Red Hat Security Advisory: trousers security, bug fix, and enhancement update
trousers: DoS vulnerability in tcsd
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:8977
Red Hat Security Advisory: dbus security update
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.5
null
null
RHSA-2018:1374
Red Hat Security Advisory: kernel-alt security and bug fix update
hw: cpu: speculative execution permission faults handling kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7.8
null
RHSA-2003:301
Red Hat Security Advisory: mod_ssl security update for Stronghold
security flaw
[ "cpe:/a:redhat:rhel_stronghold:4" ]
null
null
null
null
RHSA-2021:2235
Red Hat Security Advisory: pki-core:10.6 security update
pki-server: Dogtag installer "pkispawn" logs admin credentials into a world-readable log file
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2021:0153
Red Hat Security Advisory: dnsmasq security update
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4
null
null
RHSA-2021:3148
Red Hat Security Advisory: .NET 5.0 security and bugfix update
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2024:10381
Red Hat Security Advisory: tuned security update
tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
[ "cpe:/a:redhat:rhel_extras_rt_els:7", "cpe:/a:redhat:rhel_extras_sap_els:7", "cpe:/a:redhat:rhel_extras_sap_hana_els:7", "cpe:/o:redhat:rhel_els:7" ]
null
5.5
null
null
RHSA-2024:0972
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2020:1261
Red Hat Security Advisory: virt:8.1 security update
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:advanced_virtualization:8.1::el8" ]
null
5.6
null
null
RHSA-2017:2551
Red Hat Security Advisory: poppler security update
poppler: Stack-buffer overflow in GfxState.cc poppler: Integer overflow in JBIG2Stream.cc
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2020:4167
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: vnc: memory leakage upon disconnect QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:openstack:13::el7" ]
null
5
null
null
RHSA-2006:0576
Red Hat Security Advisory: kdebase security fix
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2017:1126
Red Hat Security Advisory: kernel security update
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
7.8
null
RHSA-2012:1407
Red Hat Security Advisory: firefox security update
Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:5362
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
nodejs-semver: Regular expression denial of service nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:10818
Red Hat Security Advisory: OpenShift Container Platform 4.17.8 security update
cri-o: malicious container can create symlink on host openssl: Possible denial of service in X.509 name checks Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
5.4
null
null
RHSA-2024:7744
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.12 security, enhancement & bug fix update
go-retryablehttp: url might write sensitive information to log file
[ "cpe:/a:redhat:openshift_data_foundation:4.13::el9" ]
null
6
null
null
RHSA-2024:2929
Red Hat Security Advisory: logging for Red Hat OpenShift security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
7.5
null
null
RHSA-2014:0885
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2024:6848
Red Hat Security Advisory: pcp security update
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4.4
null
null
RHSA-2023:4159
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2022:4965
Red Hat Security Advisory: OpenShift Container Platform 4.7.53 packages and security update
cri-o: memory exhaustion on the node when access to the kube api
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
6.8
null
null
RHSA-2021:0222
Red Hat Security Advisory: sudo security update
sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.8
null
null
RHSA-2024:2901
Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.12.1-394 Security Update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8" ]
null
5.9
null
null
RHSA-2021:3498
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2015:1066
Red Hat Security Advisory: php54 security and bug fix update
php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: HTTP response splitting in header() function
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
3.1
null
RHSA-2023:3349
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2017:0898
Red Hat Security Advisory: cfme, cfme-appliance, and cfme-gemset security, bug fix, and enhancement update
CloudForms: UI security issue on Openstack actions
[ "cpe:/a:redhat:cloudforms_managementengine:5.7::el7" ]
null
null
4.1
null
RHSA-2024:7205
Red Hat Security Advisory: osbuild-composer security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2013:1294
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update
cumin: Denial of service due to improper handling of certain Ajax requests
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2023:1107
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
RHSA-2004:064
Red Hat Security Advisory: samba security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2009:0020
Red Hat Security Advisory: bind security update
bind: DSA_do_verify() returns check issue
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null