id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:9150
|
Red Hat Security Advisory: python-jinja2 security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.4 | null | null |
RHSA-2023:2138
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 CNF vRAN extras security update
|
vault: GCP Auth Method Allows Authentication Bypass vault: incorrect policy enforcement
|
[
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 6.5 | null | null |
RHSA-2004:650
|
Red Hat Security Advisory: libxml security update
|
libxml2 long URL causes SEGV libxml2 various overflows
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2004:308
|
Red Hat Security Advisory: ipsec-tools security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:2766
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise 4.1.15 gRPC security update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 7.5 | null |
RHSA-2021:0655
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:7005
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 5.3 | null | null |
RHSA-2022:6313
|
Red Hat Security Advisory: pcs security update
|
pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 8.4 | null | null |
RHSA-2018:2225
|
Red Hat Security Advisory: fluentd security update
|
fluentd: Escape sequence injection in filter_parser.rb:filter_stream can lead to arbitrary command execution when processing logs
|
[
"cpe:/a:redhat:openstack-optools:13::el7"
] | null | null | 5.3 | null |
RHSA-2016:1781
|
Red Hat Security Advisory: rh-postgresql94-postgresql security update
|
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 7.6 | null |
RHBA-2022:8256
|
Red Hat Bug Fix Advisory: qatzip bug fix and enhancement update
|
qatzip: local privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2015:1030
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: slab corruption from use after free on INIT collisions
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHSA-2006:0760
|
Red Hat Security Advisory: thunderbird security update
|
security flaw security flaw security flaw security flaw security flaw security flaw seamonkey < 1.0.7 multiple vulnerabilities
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:5702
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.1.2 security and bug fix update
|
Django: SQL injection in QuerySet.annotate(),aggregate() and extra() Django: SQL injection via QuerySet.explain(options) on PostgreSQL
|
[
"cpe:/a:redhat:ansible_automation_platform:2.1::el8"
] | null | 9.4 | null | null |
RHSA-2023:0622
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2013:1282
|
Red Hat Security Advisory: rtkit security update
|
rtkit: insecure calling of polkit
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2867
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 1 security and bug fix update
|
tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.0"
] | null | null | 5.3 | null |
RHSA-2021:0003
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2020:2563
|
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 14 security update
|
JBoss: JAXP in EAP 7.0 allows RCE via XSL EAP: XXE issue in TransformerFactory
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_cd:14"
] | null | null | 7.5 | null |
RHSA-2024:3343
|
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
|
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2013:0601
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:1613
|
Red Hat Security Advisory: php security and bug fix update
|
PHP: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2009:1649
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
|
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHBA-2013:1581
|
Red Hat Bug Fix Advisory: libvirt bug fix and enhancement update
|
libvirt: unprivileged user can crash libvirtd during spice migration
|
[
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1480
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.7 | null |
RHSA-2024:7676
|
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update
|
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication protobuf: StackOverflow vulnerability in Protocol Buffers graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 8.8 | null | null |
RHSA-2018:3817
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R10 security and bug fix update
|
hibernate-validator: Privilege escalation when running under the security manager apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* jolokia: Cross site scripting in the HTTP servlet
|
[
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 6.1 | null |
RHSA-2018:2710
|
Red Hat Security Advisory: openstack-neutron security update
|
openstack-neutron: A router interface out of subnet IP range results in a denial of service
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 6.5 | null |
RHSA-2025:0746
|
Red Hat Security Advisory: gimp:2.8 security update
|
gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2021:2882
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2019:0162
|
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
|
kernel: Heap-based buffer overflow in fs/ext4/xattr.c:ext4_xattr_set_entry() with crafted ext4 image
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.2 | null |
RHSA-2020:1080
|
Red Hat Security Advisory: evolution security and bug fix update
|
evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2019:1932
|
Red Hat Security Advisory: kernel security update
|
kernel: Exploitable memory corruption due to UFO to non-UFO path switch
|
[
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 7 | null |
RHSA-2014:1803
|
Red Hat Security Advisory: mod_auth_mellon security update
|
mod_auth_mellon: remote memory disclosure flaw mod_auth_mellon: logout processing leads to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:5479
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update
|
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
] | null | 7.5 | null | null |
RHSA-2022:5997
|
Red Hat Security Advisory: Red Hat Ceph Storage Security, Bug Fix, and Enhancement Update
|
ceph: user/tenant can obtain access (read/write) to any share
|
[
"cpe:/a:redhat:ceph_storage:5.2::el8",
"cpe:/a:redhat:ceph_storage:5.2::el9"
] | null | 8.1 | null | null |
RHSA-2013:1135
|
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
|
Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3625
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.20 jenkins-2-plugins security update
|
jenkins-credentials-binding-plugin: information disclosure in build log when build contains no build steps jenkins-credentials-binding-plugin: improper masking of secrets jenkins-script-security-plugin: cross-site scripting vulnerability due to configure sandboxed scripts jenkins-2-plugins/matrix-project: Stored XSS vulnerability in single axis builds tooltips jenkins-2-plugins/matrix-project: Stored XSS vulnerability in multiple axis builds tooltips jenkins-2-plugins/matrix-auth: Stored XSS vulnerability in Matrix Authorization Strategy Plugin
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 8 | null | null |
RHSA-2021:4358
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c glibc: mq_notify does not handle separately allocated thread attributes glibc: Arbitrary read in wordexp()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.1 | null | null |
RHSA-2016:1580
|
Red Hat Security Advisory: chromium-browser security update
|
openjpeg: Heap overflow in parsing of JPEG2000 precincts chromium-browser: Heap overflow in pdfium chromium-browser: Address bar spoofing chromium-browser: Use-after-free in Blink chromium-browser: Parameter sanitization failure in DevTools chromium-browser: Parameter sanitization failure in DevTools chromium-browser: Same origin bypass for images in Blink chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2016:1636
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 Service Pack 1 security update
|
HTTPD: sets environmental variable based on user supplied Proxy request header Tomcat: CGI sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6"
] | null | null | 3.5 | null |
RHSA-2023:2867
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2015:2500
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2016:2640
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.3 on RHEL 6
|
undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 6.5 | null |
RHSA-2002:223
|
Red Hat Security Advisory: : Updated ypserv packages fixes memory leak
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2021:0381
|
Red Hat Security Advisory: RHV-M(ovirt-engine) 4.4.z security, bug fix, enhancement update [ovirt-4.4.4]
|
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 7.5 | null | null |
RHSA-2016:0455
|
Red Hat Security Advisory: ruby193 security update
|
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-actionpack: directory traversal in Action View, incomplete CVE-2016-0752 fix rubygem-actionpack: code injection vulnerability in Action View
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2017:0309
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
Qemu: net: out of bounds read in net_checksum_calculate() Qemu: display: cirrus: oob access while doing bitblt copy backward mode
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.5 | null |
RHSA-2023:4035
|
Red Hat Security Advisory: nodejs:18 security update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs c-ares: 0-byte UDP payload Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1609
|
Red Hat Security Advisory: p11-kit security, bug fix, and enhancement update
|
p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:1921
|
Red Hat Security Advisory: fontforge security update
|
fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2003:090
|
Red Hat Security Advisory: glibc security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:2469
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 8.8 | null | null |
RHSA-2024:3685
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: Object Request Broker (ORB) denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 5.9 | null | null |
RHSA-2019:2280
|
Red Hat Security Advisory: uriparser security update
|
uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2019:1187
|
Red Hat Security Advisory: libvirt security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 3.8 | null |
RHSA-2010:0488
|
Red Hat Security Advisory: samba and samba3x security update
|
samba: memory corruption vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.3",
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2022:0443
|
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21
|
samba: Active Directory (AD) domain user could become root on domain members polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.8 | null | null |
RHSA-2014:0349
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise
Linux 5.3 Advanced Mission Critical (AMC). This notification applies only
to those customers with subscriptions for Red Hat Enterprise Linux 5.3
Advanced Mission Critical (AMC).
|
[
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2002:259
|
Red Hat Security Advisory: sendmail security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2019:3582
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: save registry file outside share as unprivileged user
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.2 | null |
RHSA-2007:0569
|
Red Hat Security Advisory: tomcat security update
|
tomcat examples jsp XSS tomcat host manager XSS
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0343
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update
|
tomcat: multiple content-length header poisoning flaws PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application 6: JSM policy not respected by deployed applications
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2010:0146
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: 32bit process on 64bit system can trigger a kernel panic kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: sctp remote denial of service kernel: DoS on x86_64
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2005:412
|
Red Hat Security Advisory: openmotif security update
|
libxpm buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:2033
|
Red Hat Security Advisory: patch security and bug fix update
|
patch: Out-of-bounds access in pch_write_line function in pch.c patch: Double free of memory in pch.c:another_hunk() causes a crash
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2005:867
|
Red Hat Security Advisory: gpdf security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:1652
|
Red Hat Security Advisory: libssh2 security update
|
libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2022:5908
|
Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.3.10)
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
|
[
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null |
RHSA-2020:2780
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
|
EAP: Vault system property security attribute value is revealed on CLI 'reload' command tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 7.6 | 5.4 | null |
RHSA-2019:1234
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerability (APSB19-26)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2014:0323
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 security update
|
XStream: remote code execution due to insecure XML deserialization Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL
|
[
"cpe:/a:redhat:jboss_amq:6.0.0",
"cpe:/a:redhat:jboss_fuse:6.0.0"
] | null | null | null | null |
RHSA-2019:0436
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.1 | null |
RHSA-2024:5002
|
Red Hat Security Advisory: python3.11-setuptools security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:6429
|
Red Hat Security Advisory: libpq security update
|
postgresql: Client memory disclosure when connecting with Kerberos to modified server
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.7 | null | null |
RHSA-2024:11149
|
Red Hat Security Advisory: gstreamer1-plugins-good security update
|
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2015:1249
|
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
|
httpd: bypass of mod_headers rules via chunked requests
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:0234
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints
|
[
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | 4.8 | null |
RHSA-2023:0021
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2017:0161
|
Red Hat Security Advisory: python-XStatic-jquery-ui security update
|
jquery-ui: cross-site scripting in dialog closeText
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.1 | null |
RHSA-2011:1000
|
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update
|
rgmanager: insecure library loading vulnerability
|
[
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2018:3549
|
Red Hat Security Advisory: OpenShift Container Platform 3.10 security update
|
kubernetes: authentication/authorization bypass in the handling of non-101 responses
|
[
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 8.8 | null |
RHSA-2019:3391
|
Red Hat Security Advisory: libreswan security and bug fix update
|
libreswan: vulnerability in the processing of IKEv1 informational packets due to missing integrity check libreswan: null-pointer dereference by sending two IKEv2 packets
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.3 | null |
RHSA-2010:0785
|
Red Hat Security Advisory: quagga security update
|
quagga bgpd DoS (bgpd): Stack buffer overflow by processing certain Route-Refresh messages
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0061
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: From address with encoded null character is cut off in message header display Mozilla: JavaScript Execution via RSS in mailbox:// origin Mozilla: Local path string can be leaked from RSS feed Mozilla: RSS Feed vulnerable to new line Injection
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2009:1075
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_ssl per-connection memory leak for connections with zlib compression httpd: AllowOverride Options=IncludesNoExec allows Options Includes
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:1437
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:1415
|
Red Hat Security Advisory: edk2 security update
|
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2013:1521
|
Red Hat Security Advisory: python-django security update
|
python-django: directory traversal with "ssi" template tag python-django: xss in is_safe_url function
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2022:0492
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update
|
containernetworking-cni: Arbitrary path injection via type field in CNI configuration
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.2 | null | null |
RHSA-2024:2672
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.24 packages and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS buildah: full container escape at build time cri-o: Arbitrary command injection via pod annotation jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 4.3 | null | null |
RHSA-2009:1186
|
Red Hat Security Advisory: nspr and nss security, bug fix, and enhancement update
|
nss regexp heap overflow firefox/nss: doesn't handle NULL in Common Name properly deprecate MD2 in SSL cert validation (Kaminsky)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8544
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2023:4114
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update
|
openshift: OCP & FIPS mode
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 6.5 | null | null |
RHSA-2024:9820
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4090
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update
|
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
|
[
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2024:6033
|
Red Hat Security Advisory: openldap security update
|
openldap: null pointer dereference in ber_memalloc_x function
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.1 | null | null |
RHSA-2024:1318
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.8 release and security update
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7.5 | null | null |
RHSA-2021:2471
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP8 security update
|
libcurl: partial password leak over DNS on HTTP redirect curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification curl: Leak of authentication credentials in URL via automatic Referer curl: TLS 1.3 session ticket mix-up with HTTPS proxy host curl: Use-after-free in TLS session handling when using OpenSSL TLS backend
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 8.1 | null | null |
RHSA-2022:5491
|
Red Hat Security Advisory: rh-php73-php security and bug fix update
|
php: Local privilege escalation via PHP-FPM php: Special character breaks path in xml parsing php: Uninitialized array in pg_query_params() leading to RCE php: password of excessive length triggers buffer overflow leading to RCE
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.