id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:1172 | Red Hat Security Advisory: procmail security update | procmail: Heap-overflow in procmail's formail utility when processing specially-crafted email headers | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2793 | Red Hat Security Advisory: OpenShift Container Platform 4.4.11 atomic-openshift-descheduler-container security update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic | [
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.3 | null | null |
RHSA-2015:2559 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update | batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_brms:6.2"
] | null | null | null | null |
RHSA-2004:543 | Red Hat Security Advisory: cups security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2001:077 | Red Hat Security Advisory: : LPRng fails to drop supplemental group membership | security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:9452 | Red Hat Security Advisory: pcp security update | pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.4 | null | null |
RHSA-2020:2296 | Red Hat Security Advisory: openvswitch2.11 security, bug fix and enhancement update | dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto | [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 5.1 | null | null |
RHSA-2020:5439 | Red Hat Security Advisory: samba security and bug fix update | samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5 | null | null |
RHSA-2018:3540 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.8 | null |
RHSA-2023:5174 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update | envoy: gRPC access log crash caused by the listener draining | [
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 6.5 | null | null |
RHSA-2013:1144 | Red Hat Security Advisory: nss, nss-util, nss-softokn, and nspr security update | Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0442 | Red Hat Security Advisory: sssd security update | sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.8 | null | null |
RHSA-2015:0809 | Red Hat Security Advisory: java-1.8.0-openjdk security update | jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect handling of default methods (Hotspot, 8065366) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:1291 | Red Hat Security Advisory: kernel security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.3 | null | null |
RHSA-2011:0281 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK DNS cache poisoning by untrusted applets (6981922) OpenJDK Launcher incorrect processing of empty library path entries (6983554) OpenJDK Swing timer-based security manager bypass (6907662) OpenJDK Hotspot verifier heap corruption (6878713) OpenJDK JAXP untrusted component state manipulation (6927050) OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1931 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-yaql and openstack-tripleo-heat-templates) security update | YAQL: OpenStack Murano Component Information Leakage | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 8.4 | null | null |
RHSA-2021:0166 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2022:5779 | Red Hat Security Advisory: ruby:2.5 security update | ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:5813 | Red Hat Security Advisory: bind and bind-dyndb-ldap security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHBA-2020:0017 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update | jenkins: Stored XSS vulnerability in expandable textbox form control jenkins: XSS vulnerability in combobox form control jenkins: Stored XSS vulnerability in SCM tag action tooltip jenkins: Stored XSS vulnerability in queue item tooltip jenkins: Diagnostic web page exposed Cookie HTTP header jenkins: XSS vulnerability in Jenkins URL setting | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 4.8 | null |
RHSA-2018:2309 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2024:0609 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2017:1983 | Red Hat Security Advisory: postgresql security and enhancement update | postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: pg_user_mappings view discloses foreign server passwords | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.3 | null |
RHSA-2024:10666 | Red Hat Security Advisory: gimp:2.8.22 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.8 | null | null |
RHSA-2014:0284 | Red Hat Security Advisory: kernel security and bug fix update | kernel: block: passing disk names as format strings Kernel: net: IPv6: panic when UFO=On for an interface Kernel: net: memory corruption with UDP_CORK and UFO kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached kvm: division by zero in apic_get_tmcct() kvm: cross page vapic_addr access Kernel: qeth: buffer overflow in snmp ioctl | [
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
RHSA-2020:4247 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update | cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null |
RHSA-2008:0907 | Red Hat Security Advisory: pam_krb5 security update | pam_krb5 existing_ticket permission flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:2958 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:4108 | Red Hat Security Advisory: firefox security update | Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHSA-2023:2378 | Red Hat Security Advisory: postgresql-jdbc security update | postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2014:0423 | Red Hat Security Advisory: openshift-origin-broker security update | OpenShift: openshift-origin-broker plugin allows impersonation | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHEA-2020:2262 | Red Hat Enhancement Advisory: rh-varnish6 bug fix and enhancement update | varnish: denial of service handling certain crafted HTTP/1 requests | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2021:0694 | Red Hat Security Advisory: bind security update | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.1 | null | null |
RHSA-2023:0456 | Red Hat Security Advisory: thunderbird security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:5002 | Red Hat Security Advisory: curl security update | curl: Incorrect argument check can allow remote servers to overwrite local files | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.4 | null | null |
RHSA-2023:5707 | Red Hat Security Advisory: dotnet6.0 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2018:2882 | Red Hat Security Advisory: rh-haproxy18-haproxy security update | haproxy: Out-of-bounds read in HPACK decoder | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2024:0253 | Red Hat Security Advisory: sqlite security update | sqlite: heap-buffer-overflow at sessionfuzz | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null |
RHSA-2016:1389 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | 9.8 | null |
RHSA-2013:0121 | Red Hat Security Advisory: mysql security and bug fix update | mysql: regression of CVE-2009-4030 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2012:1590 | Red Hat Security Advisory: libtiff security update | (tiff2pdf): Heap-based buffer overflow due to improper initialization of T2P context struct pointer libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file libtiff: Stack-based buffer overflow when reading a tiled tiff file | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2003:167 | Red Hat Security Advisory: lv security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:1512 | Red Hat Security Advisory: postgresql security update | postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2023:0833 | Red Hat Security Advisory: python3 security update | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure python: CPU denial of service via inefficient IDNA decoder | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2019:2553 | Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) QEMU: rtl8139: integer overflow leads to buffer overflow QEMU: net: ignore packets with large size QEMU: device_tree: heap buffer overflow while loading device tree blob QEMU: scsi-generic: possible OOB access while handling inquiry request QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2023:1806 | Red Hat Security Advisory: thunderbird security update | Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:5394 | Red Hat Security Advisory: libexif security update | libexif: out of bounds write due to an integer overflow in exif-entry.c | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 9.8 | null | null |
RHSA-2024:9456 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2017:1647 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 2.9 | null |
RHSA-2016:0043 | Red Hat Security Advisory: openssh security update | OpenSSH: Client Information leak due to use of roaming connection feature OpenSSH: Client buffer-overflow when using roaming connections | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2012:0429 | Red Hat Security Advisory: gnutls security update | gnutls: buffer overflow in gnutls_session_get_data() (GNUTLS-SA-2011-2) gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0857 | Red Hat Security Advisory: python-pillow security update | pillow: Arbitrary Code Execution via the environment parameter | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2019:3925 | Red Hat Security Advisory: ansible security update | Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs | [
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | null | 5.7 | null |
RHSA-2012:0144 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: universal cross-site scripting flaw (APSB12-03) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:1824 | Red Hat Security Advisory: php security update | php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.2::computenode",
"cpe:/o:redhat:rhel_eus:6.2::server",
"cpe:/o:redhat:rhel_eus:6.3::computenode",
"cpe:/o:redhat:rhel_eus:6.3::server",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2017:2669 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: ext4 filesystem page fault race condition with fallocate call. kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c kernel: Use after free in SCSI generic device interface kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user kernel: Memory leaks in xfs_attr_list.c error paths kernel: netlink: double-free in netlink_dump kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c kernel: ping socket / AF_LLC connect() sin_family race kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) kernel: ipv4: Invalid IP options could cause skb->dst drop kernel: Race condition between multiple sys_perf_event_open() calls kernel: NULL pointer dereference in keyring_search_aux function kernel: scsi: Stack-based buffer overflow in sg_ioctl function kernel: ext4: power failure during write(2) causes on-disk information leak kernel: a race between inotify_handle_event() and sys_rename() kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.5 | null |
RHBA-2015:1465 | Red Hat Bug Fix Advisory: glibc bug fix update | glibc: calloc may return non-zero memory | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4958 | Red Hat Security Advisory: firefox security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:2785 | Red Hat Security Advisory: grafana-pcp security update | golang: net/http: handle server errors after sending GOAWAY | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:7554 | Red Hat Security Advisory: kpatch-patch security update | kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in nvmet_tcp_free_crypto in NVMe | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2019:1485 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.3 | null |
RHSA-2021:2574 | Red Hat Security Advisory: rpm security update | rpm: unsigned signature header leads to string injection into an rpm database rpm: Signature checks bypass via corrupted rpm package | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2025:3386 | Red Hat Security Advisory: freetype security update | freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 8.1 | null | null |
RHSA-2016:1485 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: various fixes from internal audits chromium-browser: sandbox escape in ppapi chromium-browser: use-after-free in extensions chromium-browser: heap-buffer-overflow in sfntly chromium-browser: same-origin bypass in blink chromium-browser: same-origin bypass in blink chromium-browser: use-after-free in blink chromium-browser: same-origin bypass in v8 chromium-browser: memory corruption in v8 chromium-browser: url spoofing libxml2: Use after free triggered by XPointer paths beginning with range-to chromium-browser: limited same-origin bypass in service workers chromium-browser: origin confusion in proxy authentication chromium-browser: url leakage via pac script chromium-browser: content-security-policy bypass chromium-browser: use after free in extensions chromium-browser: history sniffing with hsts and csp | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2025:3013 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4214 | Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:devtools:2020"
] | null | 7.5 | null | null |
RHSA-2019:4195 | Red Hat Security Advisory: thunderbird security update | Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:4034 | Red Hat Security Advisory: Red Hat Service Interconnect 1.5.4 Release security update (images) | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 5.9 | null | null |
RHSA-2021:0771 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 3.2 | null | null |
RHSA-2012:0307 | Red Hat Security Advisory: util-linux security, bug fix, and enhancement update | util-linux: mount fails to anticipate RLIMIT_FSIZE util-linux: umount may fail to remove /etc/mtab~ lock file | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1219 | Red Hat Security Advisory: xml-security security update | Java: XML signature spoofing | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2022:0538 | Red Hat Security Advisory: thunderbird security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:0841 | Red Hat Security Advisory: redhat-access-plugin security update | dashboard: log file arbitrary file retrieval | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2023:2784 | Red Hat Security Advisory: grafana security update | golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY grafana: using email as a username can block other users from signing in golang: regexp/syntax: limit memory used by parsing regexps | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2021:0658 | Red Hat Security Advisory: thunderbird security update | Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2003:195 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:1316 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status | [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 5.3 | null | null |
RHSA-2018:3253 | Red Hat Security Advisory: jasper security update | jasper: reachable assertion in JPC_NOMINALGAIN() jasper: NULL pointer exception in jp2_encode() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.5 | null |
RHSA-2021:3366 | Red Hat Security Advisory: python3 security update | python: CRLF injection via HTTP request method in httplib/http.client | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 6.5 | null | null |
RHSA-2015:2504 | Red Hat Security Advisory: libreport security update | libreport: Possible private data leak in Bugzilla bugs opened by ABRT | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1352 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.6 | null | null |
RHSA-2024:7822 | Red Hat Security Advisory: container-tools:rhel8 security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2008:0207 | Red Hat Security Advisory: firefox security update | Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1378 | Red Hat Security Advisory: openstack-ironic security update | openstack-ironic: Ironic Node information including credentials exposed to unauthenticated users | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.9 | null |
RHSA-2020:2926 | Red Hat Security Advisory: OpenShift Container Platform 4.4.13 openshift-enterprise-hyperkube-container security update | kubernetes: node localhost services reachable via martian packets | [
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.4 | null | null |
RHSA-2020:4137 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.6.6-1 - RHEL7 Container | django-rest-framework: XSS Vulnerability in API viewer | [
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 5.4 | null | null |
RHSA-2024:4934 | Red Hat Security Advisory: git-lfs security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2021:4032 | Red Hat Security Advisory: Openshift Logging 5.2.3 bug fix and security update | nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option | [
"cpe:/a:redhat:logging:5.2::el8"
] | null | 9.8 | null | null |
RHSA-2020:1932 | Red Hat Security Advisory: container-tools:rhel8 security update | buildah: Crafted input tar file may lead to local file overwrite during image build process | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4068 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2015:2514 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2"
] | null | null | null | null |
RHSA-2024:5929 | Red Hat Security Advisory: postgresql:16 security update | postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2019:2178 | Red Hat Security Advisory: udisks2 security, bug fix, and enhancement update | udisks: Format string vulnerability in udisks_log in udiskslogging.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2013:1121 | Red Hat Security Advisory: sos security update | sosreport does not blank root password in anaconda plugin | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2038 | Red Hat Security Advisory: squid:4 security update | squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.1 | null | null |
RHSA-2019:2805 | Red Hat Security Advisory: systemd security update | systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7 | null |
RHSA-2003:064 | Red Hat Security Advisory: : Updated XFree86 4.1.0 packages are available | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2014:1291 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null |
RHSA-2022:1644 | Red Hat Security Advisory: xmlrpc-c security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 9.8 | null | null |
RHSA-2012:0378 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.2.0 update | extension): MITM due to improper validation of AX attribute signatures | [
"cpe:/a:redhat:jboss_soa_platform:5.2"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.