id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2013:1868 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: integer underflow when handling trapezoids | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:7472 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | QEMU: fdc: heap buffer overflow in DMA read data transfers libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service libguestfs: Buffer overflow in get_keys leads to DoS swtpm: Unchecked header size indicator against expected size | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2023:7676 | Red Hat Security Advisory: Red Hat Data Grid 8.4.6 security update | hotrod-client: Hot Rod client does not enable hostname validation when using TLS that lead to a MITM attack infinispan: Credentials returned from configuration as clear text jose4j: Insecure iteration count setting | [
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 6.8 | null | null |
RHSA-2015:1713 | Red Hat Security Advisory: rhev-hypervisor security, bug fix, and enhancement update | jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012) jasper: heap overflow in jp2_decode() (oCERT-2014-012) RHEV-M: webadmin automatic logout fails if VM is selected spice: memory corruption in worker_update_monitors_config() | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2014:0926 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() xen: Hypervisor heap contents leaked to guests (xsa-100) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2552 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
] | null | null | 8.1 | null |
RHSA-2002:295 | Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2014:0827 | Red Hat Security Advisory: tomcat security update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:3044 | Red Hat Security Advisory: kpatch-patch security update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2016:0511 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2004:259 | Red Hat Security Advisory: samba security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:2237 | Red Hat Security Advisory: nss, nss-softokn, nss-util, and nspr security, bug fix, and enhancement update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Cache side-channel variant of the Bleichenbacher attack nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2012:0532 | Red Hat Security Advisory: nss security update | Updated nss packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.6 Extended Update Support
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2010:0893 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfsd4: bug in read_buf | [
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2005:152 | Red Hat Security Advisory: postfix security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:2908 | Red Hat Security Advisory: rh-nodejs6-nodejs security update | nodejs: Constant Hashtable Seeds vulnerability c-ares: NAPTR parser out of bounds access | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.5 | null |
RHSA-2019:1891 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: nfs: use-after-free in svc_process_common() kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7 | 8.8 | null |
RHSA-2023:4313 | Red Hat Security Advisory: rh-postgresql12-postgresql security update | postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.2 | null | null |
RHSA-2018:3432 | Red Hat Security Advisory: glusterfs security and bug fix update | glusterfs: glusterfs server exploitable via symlinks to relative paths glusterfs: Buffer overflow in "features/locks" translator allows for denial of service glusterfs: Heap-based buffer overflow via "gf_getspec_req" RPC message glusterfs: "features/index" translator can create arbitrary, empty files glusterfs: Unlimited file creation via "GF_XATTR_IOSTATS_DUMP_KEY" xattr allows for denial of service glusterfs: Repeat use of "GF_META_LOCK_KEY" xattr allows for memory exhaustion glusterfs: features/locks translator passes an user-controlled string to snprintf without a proper format string resulting in a denial of service | [
"cpe:/a:redhat:storage:3.4:server:el7",
"cpe:/a:redhat:storage:3:client:el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2020:0006 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 8.4 | null |
RHSA-2019:3436 | Red Hat Security Advisory: httpd:2.4 security and bug fix update | httpd: mod_auth_digest: access control bypass due to race condition httpd: URL normalization inconsistency | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.3 | null |
RHSA-2023:0709 | Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0 | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps | [
"cpe:/a:redhat:openshift_serverless:1.27::el8"
] | null | 6.5 | null | null |
RHSA-2019:0365 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 for RHEL 7 security update | wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 5.3 | null |
RHSA-2023:5928 | Red Hat Security Advisory: tomcat security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2004:166 | Red Hat Security Advisory: : Updated kernel packages resolve security vulnerabilities | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:0087 | Red Hat Security Advisory: usbguard security update | usbguard: Fix unauthorized access via D-Bus | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2013:0121 | Red Hat Security Advisory: mysql security and bug fix update | mysql: regression of CVE-2009-4030 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0882 | Red Hat Security Advisory: kernel security and bug fix update | kernel: gdth: Prevent negative offsets in ioctl kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: e1000 issue reported at 26c3 kernel: ipv6: skb is unexpectedly freed kernel: mm: keep a guard page below a grow-down stack segment kernel: 64-bit Compatibility Mode Stack Pointer Underflow | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es"
] | null | null | null | null |
RHSA-2015:0989 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2016:1654 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 3.4 | null |
RHSA-2004:047 | Red Hat Security Advisory: pwlib security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:1584 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | null | null |
RHSA-2020:2832 | Red Hat Security Advisory: kernel security and bug fix update | kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 5.3 | null | null |
RHSA-2023:1572 | Red Hat Security Advisory: pesign security update | pesign: Local privilege escalation on pesign systemd service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2016:1776 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) OpenJDK: missing entity replacement limits (JAXP, 8149962) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) OpenJDK: insufficient bytecode verification (Hotspot, 8155981) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:0539 | Red Hat Security Advisory: tomcat security update | tomcat: HTTP request smuggling via malformed trailer headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2007:1114 | Red Hat Security Advisory: samba security and bug fix update | samba: send_mailslot() buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2017:3455 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update | Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 5.5 | null |
RHSA-2024:8120 | Red Hat Security Advisory: java-11-openjdk security update | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/o:redhat:rhel_els:7"
] | null | 4.8 | null | null |
RHSA-2024:11570 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.5 Security update | undertow: information leakage via HTTP/2 request header reuse hornetq-core-client: Arbitrarily overwrite files or access sensitive information | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.1 | null | null |
RHSA-2022:5754 | Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 7.5 | null | null |
RHSA-2021:1189 | Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update | openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.4 | null | null |
RHSA-2018:3800 | Red Hat Security Advisory: rh-git218-git security update | git: Improper handling of PATH allows for commands to be executed from the current directory | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2024:1920 | Red Hat Security Advisory: sssd security update | sssd: Race condition during authorization leads to GPO policies functioning inconsistently | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2022:1793 | Red Hat Security Advisory: container-tools:3.0 security and bug fix update | crun: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | null | null |
RHSA-2024:11299 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2022:1076 | Red Hat Security Advisory: openssl security update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2018:0116 | Red Hat Security Advisory: rh-eclipse46-jackson-databind security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2024:6360 | Red Hat Security Advisory: libtiff security update | libtiff: NULL pointer dereference in tif_dirinfo.c | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2022:1476 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes | cached-path-relative: Prototype Pollution via the cache variable nanoid: Information disclosure via valueOf() function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic nodejs-shelljs: improper privilege management follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path golang: crash in a golang.org/x/crypto/ssh server | [
"cpe:/a:redhat:acm:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2005:480 | Red Hat Security Advisory: ImageMagick security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:7256 | Red Hat Security Advisory: dotnet7.0 security update | dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2017:2649 | Red Hat Security Advisory: instack-undercloud security, bug fix, and enhancement update | instack-undercloud: uses hardcoded /tmp paths | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.1 | null |
RHSA-2014:0029 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.0 update | Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler PicketBox: Insecure storage of masked passwords HawtJNI: predictable temporary file name leading to local arbitrary code execution JSF2: Multiple Information Disclosure flaws due to unsafe path traversal JGroups: Authentication via cached credentials Solr: directory traversal when loading XSL stylesheets and Velocity templates Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler Solr: XML eXternal Entity (XXE) flaw in DocumentAnalysisRequestHandler | [
"cpe:/a:redhat:jboss_data_grid:6.2.0"
] | null | null | null | null |
RHSA-2022:6173 | Red Hat Security Advisory: rsync security update | rsync: remote arbitrary files write inside the directories of connecting peers | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.4 | null | null |
RHSA-2018:1606 | Red Hat Security Advisory: sensu security update | sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections | [
"cpe:/a:redhat:openstack-optools:10::el7"
] | null | null | 5.5 | null |
RHBA-2023:1321 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.58 packages update | haproxy: segfault DoS | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 4.3 | null | null |
RHSA-2008:0519 | Red Hat Security Advisory: kernel security and bug fix update | kernel: linux x86_64 ia32 emulation leaks uninitialized data kernel: dccp: sanity check feature length kernel: [x86_64] The string instruction version didn't zero the output on exception. | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2008:0180 | Red Hat Security Advisory: krb5 security update | krb5: double free in gssapi lib krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0335 | Red Hat Security Advisory: kpatch-patch security update | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2020:2672 | Red Hat Security Advisory: libexif security update | libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 9.1 | null | null |
RHSA-2023:0245 | Red Hat Security Advisory: OpenShift Container Platform 4.11.25 security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2024:1824 | Red Hat Security Advisory: OpenJDK 17.0.11 Security Update for Windows Builds | OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
RHSA-2024:0408 | Red Hat Security Advisory: edk2 security update | edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 5.3 | null | null |
RHSA-2024:1267 | Red Hat Security Advisory: OpenShift Container Platform 4.12.53 packages and security update | kube-controller-manager: malformed HPA v1 manifest causes crash | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.7 | null | null |
RHSA-2007:1031 | Red Hat Security Advisory: xpdf security update | t1lib font filename string overflow CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2014:1507 | Red Hat Security Advisory: trousers security, bug fix, and enhancement update | trousers: DoS vulnerability in tcsd | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:8977 | Red Hat Security Advisory: dbus security update | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2018:1374 | Red Hat Security Advisory: kernel-alt security and bug fix update | hw: cpu: speculative execution permission faults handling kernel: ptrace() incorrect error handling leads to corruption and DoS | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.8 | null |
RHSA-2003:301 | Red Hat Security Advisory: mod_ssl security update for Stronghold | security flaw | [
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2021:2235 | Red Hat Security Advisory: pki-core:10.6 security update | pki-server: Dogtag installer "pkispawn" logs admin credentials into a world-readable log file | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2021:0153 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4 | null | null |
RHSA-2021:3148 | Red Hat Security Advisory: .NET 5.0 security and bugfix update | dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2024:10381 | Red Hat Security Advisory: tuned security update | tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method | [
"cpe:/a:redhat:rhel_extras_rt_els:7",
"cpe:/a:redhat:rhel_extras_sap_els:7",
"cpe:/a:redhat:rhel_extras_sap_hana_els:7",
"cpe:/o:redhat:rhel_els:7"
] | null | 5.5 | null | null |
RHSA-2024:0972 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1261 | Red Hat Security Advisory: virt:8.1 security update | QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/a:redhat:advanced_virtualization:8.1::el8"
] | null | 5.6 | null | null |
RHSA-2017:2551 | Red Hat Security Advisory: poppler security update | poppler: Stack-buffer overflow in GfxState.cc poppler: Integer overflow in JBIG2Stream.cc | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2020:4167 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: vnc: memory leakage upon disconnect QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 5 | null | null |
RHSA-2006:0576 | Red Hat Security Advisory: kdebase security fix | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:1126 | Red Hat Security Advisory: kernel security update | kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 7.8 | null |
RHSA-2012:1407 | Red Hat Security Advisory: firefox security update | Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5362 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | nodejs-semver: Regular expression denial of service nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:10818 | Red Hat Security Advisory: OpenShift Container Platform 4.17.8 security update | cri-o: malicious container can create symlink on host openssl: Possible denial of service in X.509 name checks Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.4 | null | null |
RHSA-2024:7744 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.12 security, enhancement & bug fix update | go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift_data_foundation:4.13::el9"
] | null | 6 | null | null |
RHSA-2024:2929 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 7.5 | null | null |
RHSA-2014:0885 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | PicketLink: XXE via insecure DocumentBuilderFactory usage | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2024:6848 | Red Hat Security Advisory: pcp security update | pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.4 | null | null |
RHSA-2023:4159 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2022:4965 | Red Hat Security Advisory: OpenShift Container Platform 4.7.53 packages and security update | cri-o: memory exhaustion on the node when access to the kube api | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 6.8 | null | null |
RHSA-2021:0222 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2024:2901 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.12.1-394 Security Update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
] | null | 5.9 | null | null |
RHSA-2021:3498 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:1066 | Red Hat Security Advisory: php54 security and bug fix update | php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: HTTP response splitting in header() function | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.1 | null |
RHSA-2023:3349 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2017:0898 | Red Hat Security Advisory: cfme, cfme-appliance, and cfme-gemset security, bug fix, and enhancement update | CloudForms: UI security issue on Openstack actions | [
"cpe:/a:redhat:cloudforms_managementengine:5.7::el7"
] | null | null | 4.1 | null |
RHSA-2024:7205 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2013:1294 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update | cumin: Denial of service due to improper handling of certain Ajax requests | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:1107 | Red Hat Security Advisory: pesign security update | pesign: Local privilege escalation on pesign systemd service | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2004:064 | Red Hat Security Advisory: samba security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2009:0020 | Red Hat Security Advisory: bind security update | bind: DSA_do_verify() returns check issue | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.