id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:2097
Red Hat Security Advisory: container-tools:4.0 security update
buildah: full container escape at build time
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
RHSA-2023:0806
Red Hat Security Advisory: Mozilla Firefox security update
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2014:1294
Red Hat Security Advisory: bash security update
bash: specially-crafted environment variables can be used to inject shell commands
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2019:4361
Red Hat Security Advisory: fribidi security update
fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.8
null
RHSA-2016:0441
Red Hat Security Advisory: openstack-heat bug fix and security advisory
openstack-heat: Vulnerability in Heat template validation leading to DoS
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2022:0440
Red Hat Security Advisory: aide security update
aide: heap-based buffer overflow on outputs larger than B64_BUF
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2022:5719
Red Hat Security Advisory: grafana security update
grafana: OAuth account takeover
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.1
null
null
RHSA-2022:8893
Red Hat Security Advisory: OpenShift Container Platform 4.11.20 security update
golang: crash in a golang.org/x/crypto/ssh server
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2013:1209
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update
httpd: multiple XSS flaws due to unescaped hostnames httpd: XSS flaw in mod_proxy_balancer manager interface httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav PicketBox: Insecure storage of masked passwords Java: XML signature spoofing JGroups: Authentication via cached credentials Bayeux: Reflected Cross-Site Scripting (XSS)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.1.1" ]
null
null
null
null
RHSA-2023:2780
Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2008:0269
Red Hat Security Advisory: redhat-ds-base security update
Server: insufficient buffer size for search patterns
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2018:1450
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
8.1
null
RHSA-2010:0981
Red Hat Security Advisory: HelixPlayer removal
HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:2532
Red Hat Security Advisory: libarchive security update
libarchive: NULL pointer dereference in archive_write.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2017:3240
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
5.9
null
RHSA-2022:1345
Red Hat Security Advisory: Red Hat AMQ Streams 2.1.0 release and security update
lz4: memory corruption due to an integer overflow bug caused by memmove argument netty: control chars in header names may lead to HTTP request smuggling
[ "cpe:/a:redhat:amq_streams:2" ]
null
6.5
null
null
RHSA-2023:3380
Red Hat Security Advisory: apr-util security update
apr-util: out-of-bounds writes in the apr_base64
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
6.5
null
null
RHSA-2021:3259
Red Hat Security Advisory: OpenShift Virtualization 4.8.1 Images security and bug fix update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:4.8::el8" ]
null
6.5
null
null
RHBA-2016:2206
Red Hat Bug Fix Advisory: evolution-data-server bug fix update
evolution-data-server: IMAPx Component Information Disclosure
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2023:3195
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents
[ "cpe:/a:redhat:ocp_tools:4.12::el8" ]
null
5.3
null
null
RHSA-2017:0156
Red Hat Security Advisory: openstack-cinder security update
openstack-nova/glance/cinder: Malicious image may exhaust resources
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
5.3
null
RHEA-2015:1077
Red Hat Enhancement Advisory: Red Hat JBoss Enterprise Application Platform 6.4.1 update
EAP: LDAP bind password is being logged with TRACE log level
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
null
null
RHSA-2015:0728
Red Hat Security Advisory: ipa and slapi-nis security and bug fix update
slapi-nis: infinite loop in getgrnam_r() and getgrgid_r() ipa: memory corruption when using get_user_grouplist()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2011:0307
Red Hat Security Advisory: mailman security update
mailman: XSS triggerable by list administrator mailman: Multiple security flaws leading to cross-site scripting (XSS) attacks Mailman: Three XSS flaws due improper escaping of the full name of the member
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1428
Red Hat Security Advisory: jakarta-commons-fileupload security update
commons-fileupload: Arbitrary file upload via deserialization
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2020:2870
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-cni security update
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
null
7.5
null
RHSA-2023:5866
Red Hat Security Advisory: grafana security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2018:1227
Red Hat Security Advisory: OpenShift Container Platform 3.9 security update
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
9.9
null
RHSA-2024:0247
Red Hat Security Advisory: OpenJDK 21.0.2 security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:openjdk:21" ]
null
7.4
null
null
RHSA-2009:1218
Red Hat Security Advisory: pidgin security update
pidgin: insufficient input validation in msn_slplink_process_msg()
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2020:0707
Red Hat Security Advisory: http-parser security update
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.1
null
null
RHSA-2020:1510
Red Hat Security Advisory: http-parser security update
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
7.1
null
null
RHSA-2008:0497
Red Hat Security Advisory: sblim security update
sblim: libraries built with insecure RPATH
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:6702
Red Hat Security Advisory: pcs security update
rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML
[ "cpe:/a:redhat:rhel_e4s:8.6::highavailability", "cpe:/a:redhat:rhel_tus:8.6::highavailability" ]
null
5.9
null
null
RHSA-2005:294
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2017:2728
Red Hat Security Advisory: postgresql security update
postgresql: Empty password accepted in some authentication methods postgresql: pg_user_mappings view discloses passwords to users lacking server privileges
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2022:5099
Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update
grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.3
null
null
RHSA-2024:1058
Red Hat Security Advisory: python-pillow security update
pillow: Arbitrary Code Execution via the environment parameter
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
8.1
null
null
RHSA-2022:2143
Red Hat Security Advisory: container-tools:3.0 security update
psgo: Privilege escalation in 'podman top'
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2012:1045
Red Hat Security Advisory: php security update
php: zend_strndup() NULL pointer dereference may cause DoS php: XSLT file writing vulnerability php: strtotime timezone memory leak php: $_FILES array indexes corruption php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:3043
Red Hat Security Advisory: jbig2dec security update
jbig2dec: heap-based buffer overflow in jbig2_image_compose in jbig2_image.c
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.8
null
null
RHBA-2019:1053
Red Hat Bug Fix Advisory: redhat-virtualization-host bug fix and enhancement update
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
4.8
null
RHSA-2023:3590
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2023:4495
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2021:0497
Red Hat Security Advisory: openvswitch2.13 security and bug fix update
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
7.5
null
null
RHSA-2022:5772
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
6.1
null
RHSA-2021:3946
Red Hat Security Advisory: redis:5 security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
null
null
RHSA-2022:0331
Red Hat Security Advisory: samba security and bug fix update
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
9.9
null
null
RHSA-2011:0491
Red Hat Security Advisory: python security update
expat: buffer over-read and crash on XML with malformed UTF-8 sequences python: audioop: incorrect integer overflow checks Python: Memory corruption in audioop module Python: SMTP proxy RFC 2821 module DoS (uncaught exception) (Issue #9129) (CGIHTTPServer): CGI script source code disclosure urllib2): Improper management of ftp:// and file:// URL schemes (Issue #11662)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2038
Red Hat Security Advisory: python-django security update
python-django: CSRF protection bypass on a site with Google Analytics
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
6.1
null
RHSA-2020:4011
Red Hat Security Advisory: e2fsprogs security and bug fix update
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
6.4
null
RHSA-2016:1190
Red Hat Security Advisory: chromium-browser security update
chromium-browser: cross-origin bypass in extension bindings chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extensions chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extension bindings chromium-browser: type confusion in v8 chromium-browser: heap overflow in v8 chromium-browser: heap use-after-free in v8 bindings chromium-browser: heap use-after-free in skia chromium-browser: heap overflow in pdfium chromium-browser: csp bypass for serviceworker chromium-browser: out-of-bounds access in libxslt chromium-browser: integer overflow in libxslt chromium-browser: out-of-bounds read in pdfium chromium-browser: out-of-bounds read in pdfium chromium-browser: information leak in extensions chromium-browser: out-of-bounds read in v8 chromium-browser: heap buffer overflow in media chromium-browser: heap use-after-free in autofill chromium-browser: heap buffer-overflow in skia chromium-browser: limited cross-origin bypass in serviceworker chromium-browser: http download of software removal tool chromium-browser: hpkp pins removed on cache clearance chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2025:1848
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
[ "cpe:/a:redhat:trusted_artifact_signer:1.1::el9" ]
null
8.2
null
null
RHSA-2024:8455
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2019:2553
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) QEMU: rtl8139: integer overflow leads to buffer overflow QEMU: net: ignore packets with large size QEMU: device_tree: heap buffer overflow while loading device tree blob QEMU: scsi-generic: possible OOB access while handling inquiry request QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
3.8
null
RHSA-2010:0476
Red Hat Security Advisory: rhev-hypervisor security, bug fix, and enhancement update
libspice: Insufficient guest provided memory mappings boundaries validations qemu: Improper handling of erroneous data provided by Linux virtio-net driver vdsm: missing VM post-zeroing after removal
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2024:4420
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2015:0776
Red Hat Security Advisory: docker security update
docker: regression of CVE-2014-5277
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2013:1427
Red Hat Security Advisory: ruby193-ruby security update
rubygems: version regex algorithmic complexity vulnerability
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2014:1835
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
4.8
null
RHSA-2016:2991
Red Hat Security Advisory: openstack-cinder, openstack-glance, and openstack-nova update
openstack-nova/glance/cinder: Malicious image may exhaust resources
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
5.3
null
RHSA-2023:5838
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2021:4779
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
7.8
null
null
RHSA-2019:3203
Red Hat Security Advisory: Ansible security and bug fix update
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
[ "cpe:/a:redhat:ansible_engine:2.8::el7", "cpe:/a:redhat:ansible_engine:2.8::el8" ]
null
5
6.4
null
RHSA-2024:0775
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
SnakeYaml: Constructor Deserialization Remote Code Execution maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents Jenkins: Session fixation vulnerability in OpenShift Login Plugin jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE jenkins: cross-site WebSocket hijacking
[ "cpe:/a:redhat:ocp_tools:4.11::el8" ]
null
8.8
null
null
RHSA-2024:9404
Red Hat Security Advisory: libgcrypt security update
libgcrypt: vulnerable to Marvin Attack
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2021:2529
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: ide: atapi: OOB access while processing read commands
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
3.9
null
null
RHSA-2023:5438
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2020:4763
Red Hat Security Advisory: dovecot security update
dovecot: command followed by sufficient number of newlines leads to use-after-free dovecot: sending mail with empty quoted localpart leads to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2023:4208
Red Hat Security Advisory: OpenJDK security update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:openjdk:11" ]
null
7.5
null
null
RHSA-2008:0638
Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update
java-1.5.0 Privilege escalation via unstrusted applet and application Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start Java RE allows Same Origin Policy to be Bypassed (6687932) security flaw Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074)
[ "cpe:/a:redhat:network_satellite:5.1::el4" ]
null
null
null
null
RHSA-2010:0041
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: gdth: Prevent negative offsets in ioctl kernel: fuse: prevent fuse_put_request on invalid pointer kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2013:0709
Red Hat Security Advisory: openstack-nova security and bug fix update
nova: VNC proxy can connect to the wrong VM Nova: DoS by allocating all Fixed IPs
[ "cpe:/a:redhat:openstack:2::el6" ]
null
null
null
null
RHSA-2022:4947
Red Hat Security Advisory: OpenShift Container Platform 4.6.59 security update
cri-o: memory exhaustion on the node when access to the kube api credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
5.4
null
null
RHSA-2021:4587
Red Hat Security Advisory: gcc security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.5
null
null
RHSA-2018:2666
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds write in V8 chromium-browser: Out of bounds read in Blink chromium-browser: Out of bounds read in WebAudio chromium-browser: Out of bounds write in Mojo chromium-browser: Out of bounds read in SwiftShader chromium-browser: Integer overflow in Skia chromium-browser: Use after free in WebRTC chromium-browser: Site Isolation bypass after tab restore chromium-browser: Site Isolation bypass using Blob URLS chromium-browser: Local file access in Blink chromium-browser: Out of bounds read in PDFium chromium-browser: Content security policy bypass in Blink chromium-browser: Credit card information leak in Autofill chromium-browser: URL spoof in permission dialogs chromium-browser: URL spoof in full screen mode chromium-browser: Local file access in DevTools chromium-browser: Stack buffer overflow in SwiftShader chromium-browser: Out of bounds read in WebRTC chromium-browser: User confirmation bypass in external protocol handling chromium-browser: Use after free in Memory Instrumentation chromium-browser: Script injection in New Tab Page chromium-browser: Multiple download restriction bypass chromium-browser: User gesture requirement bypass
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2023:4059
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.1
null
null
RHSA-2018:2930
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.11 security and bug fix update
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: A bug in the UTF-8 decoder can lead to DoS slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
9.8
null
RHSA-2021:0701
Red Hat Security Advisory: grub2 security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
7.5
null
null
RHSA-2003:246
Red Hat Security Advisory: wu-ftpd security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es" ]
null
null
null
null
RHSA-2019:3812
Red Hat Security Advisory: OpenShift Container Platform 3.9 cri-o security update
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
6.4
null
RHSA-2024:1319
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.8 release and security update
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7" ]
null
7.5
null
null
RHSA-2019:2731
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update
dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.9
null
RHSA-2020:3044
Red Hat Security Advisory: dbus security update
dbus: denial of service via file descriptor leak
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
6.5
null
null
RHSA-2025:0279
Red Hat Security Advisory: webkit2gtk3 security update
WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption webkit: Processing maliciously crafted web content may lead to an unexpected process crash
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
6.5
null
null
RHSA-2018:3600
Red Hat Security Advisory: python-cryptography security update
python-cryptography: GCM tag forgery via truncated tag in finalize_with_tag API
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
7.5
null
RHSA-2023:4674
Red Hat Security Advisory: OpenShift Container Platform 4.12.30 packages and security update
golang: net/http: handle server errors after sending GOAWAY
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
6.5
null
null
RHSA-2023:6566
Red Hat Security Advisory: libmicrohttpd security update
libmicrohttpd: remote DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.9
null
null
RHSA-2019:4097
Red Hat Security Advisory: OpenShift Container Platform 4.2 jenkins-2-plugins security update
jenkins-script-security-plugin: handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of property names in property expressions on the left-hand side of assignment expression leads to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins: Stored XSS vulnerability in HTML Publisher Plugin
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
4.2
5.4
null
RHSA-2024:2193
Red Hat Security Advisory: podman security update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2018:1638
Red Hat Security Advisory: kernel security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
5.6
null
RHSA-2024:1503
Red Hat Security Advisory: nodejs:18 security update
nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) nodejs: code injection and privilege escalation through Linux capabilities nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:2238
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
5.3
null
null
RHSA-2025:0425
Red Hat Security Advisory: OpenJDK 17.0.14 Security Update for Windows Builds
openjdk: Enhance array handling (Oracle CPU 2025-01)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
4.8
null
null
RHSA-2023:5697
Red Hat Security Advisory: OpenShift Container Platform 4.11.52 bug fix and security update
distribution/distribution: DoS from malicious API request golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2024:6558
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2022:4730
Red Hat Security Advisory: thunderbird security update
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2023:7610
Red Hat Security Advisory: OpenShift Container Platform 4.12.45 packages and security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) python-werkzeug: high resource consumption leading to denial of service
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9", "cpe:/a:redhat:openshift_ironic:4.12::el9" ]
null
7.5
null
null
RHSA-2006:0608
Red Hat Security Advisory: seamonkey security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw vulnerabilities: CVE-2006-{3113,3677,3801-3812}
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2004:030
Red Hat Security Advisory: : Updated NetPBM packages fix multiple temporary file vulnerabilities
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null