id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:9150
Red Hat Security Advisory: python-jinja2 security update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.4
null
null
RHSA-2023:2138
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 CNF vRAN extras security update
vault: GCP Auth Method Allows Authentication Bypass vault: incorrect policy enforcement
[ "cpe:/a:redhat:openshift:4.13::el8" ]
null
6.5
null
null
RHSA-2004:650
Red Hat Security Advisory: libxml security update
libxml2 long URL causes SEGV libxml2 various overflows
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2004:308
Red Hat Security Advisory: ipsec-tools security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2019:2766
Red Hat Security Advisory: Red Hat OpenShift Enterprise 4.1.15 gRPC security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
7.5
null
RHSA-2021:0655
Red Hat Security Advisory: firefox security update
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2022:7005
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
5.3
null
null
RHSA-2022:6313
Red Hat Security Advisory: pcs security update
pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
8.4
null
null
RHSA-2018:2225
Red Hat Security Advisory: fluentd security update
fluentd: Escape sequence injection in filter_parser.rb:filter_stream can lead to arbitrary command execution when processing logs
[ "cpe:/a:redhat:openstack-optools:13::el7" ]
null
null
5.3
null
RHSA-2016:1781
Red Hat Security Advisory: rh-postgresql94-postgresql security update
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
7.6
null
RHBA-2022:8256
Red Hat Bug Fix Advisory: qatzip bug fix and enhancement update
qatzip: local privilege escalation
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2015:1030
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: slab corruption from use after free on INIT collisions
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
null
null
RHSA-2006:0760
Red Hat Security Advisory: thunderbird security update
security flaw security flaw security flaw security flaw security flaw security flaw seamonkey < 1.0.7 multiple vulnerabilities
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:5702
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.1.2 security and bug fix update
Django: SQL injection in QuerySet.annotate(),aggregate() and extra() Django: SQL injection via QuerySet.explain(options) on PostgreSQL
[ "cpe:/a:redhat:ansible_automation_platform:2.1::el8" ]
null
9.4
null
null
RHSA-2023:0622
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2013:1282
Red Hat Security Advisory: rtkit security update
rtkit: insecure calling of polkit
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:2867
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 1 security and bug fix update
tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0" ]
null
null
5.3
null
RHSA-2021:0003
Red Hat Security Advisory: kernel security and bug fix update
kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.7
null
null
RHSA-2020:2563
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 14 security update
JBoss: JAXP in EAP 7.0 allows RCE via XSL EAP: XXE issue in TransformerFactory
[ "cpe:/a:redhat:jboss_enterprise_application_platform_cd:14" ]
null
null
7.5
null
RHSA-2024:3343
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2013:0601
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2016:1613
Red Hat Security Advisory: php security and bug fix update
PHP: sets environmental variable based on user supplied Proxy request header
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5
null
RHSA-2009:1649
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHBA-2013:1581
Red Hat Bug Fix Advisory: libvirt bug fix and enhancement update
libvirt: unprivileged user can crash libvirtd during spice migration
[ "cpe:/a:redhat:storage:3:server:el6", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:1480
Red Hat Security Advisory: mysql55-mysql security update
mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
3.7
null
RHSA-2024:7676
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication protobuf: StackOverflow vulnerability in Protocol Buffers graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
[ "cpe:/a:redhat:quarkus:3.2::el8" ]
null
8.8
null
null
RHSA-2018:3817
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R10 security and bug fix update
hibernate-validator: Privilege escalation when running under the security manager apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* jolokia: Cross site scripting in the HTTP servlet
[ "cpe:/a:redhat:jboss_amq:6.3", "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
6.1
null
RHSA-2018:2710
Red Hat Security Advisory: openstack-neutron security update
openstack-neutron: A router interface out of subnet IP range results in a denial of service
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
6.5
null
RHSA-2025:0746
Red Hat Security Advisory: gimp:2.8 security update
gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2021:2882
Red Hat Security Advisory: thunderbird security update
Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2019:0162
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
kernel: Heap-based buffer overflow in fs/ext4/xattr.c:ext4_xattr_set_entry() with crafted ext4 image
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
5.2
null
RHSA-2020:1080
Red Hat Security Advisory: evolution security and bug fix update
evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2019:1932
Red Hat Security Advisory: kernel security update
kernel: Exploitable memory corruption due to UFO to non-UFO path switch
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
7
null
RHSA-2014:1803
Red Hat Security Advisory: mod_auth_mellon security update
mod_auth_mellon: remote memory disclosure flaw mod_auth_mellon: logout processing leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:5479
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" ]
null
7.5
null
null
RHSA-2022:5997
Red Hat Security Advisory: Red Hat Ceph Storage Security, Bug Fix, and Enhancement Update
ceph: user/tenant can obtain access (read/write) to any share
[ "cpe:/a:redhat:ceph_storage:5.2::el8", "cpe:/a:redhat:ceph_storage:5.2::el9" ]
null
8.1
null
null
RHSA-2013:1135
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:3625
Red Hat Security Advisory: OpenShift Container Platform 4.4.20 jenkins-2-plugins security update
jenkins-credentials-binding-plugin: information disclosure in build log when build contains no build steps jenkins-credentials-binding-plugin: improper masking of secrets jenkins-script-security-plugin: cross-site scripting vulnerability due to configure sandboxed scripts jenkins-2-plugins/matrix-project: Stored XSS vulnerability in single axis builds tooltips jenkins-2-plugins/matrix-project: Stored XSS vulnerability in multiple axis builds tooltips jenkins-2-plugins/matrix-auth: Stored XSS vulnerability in Matrix Authorization Strategy Plugin
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
8
null
null
RHSA-2021:4358
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c glibc: mq_notify does not handle separately allocated thread attributes glibc: Arbitrary read in wordexp()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.1
null
null
RHSA-2016:1580
Red Hat Security Advisory: chromium-browser security update
openjpeg: Heap overflow in parsing of JPEG2000 precincts chromium-browser: Heap overflow in pdfium chromium-browser: Address bar spoofing chromium-browser: Use-after-free in Blink chromium-browser: Parameter sanitization failure in DevTools chromium-browser: Parameter sanitization failure in DevTools chromium-browser: Same origin bypass for images in Blink chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2016:1636
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 Service Pack 1 security update
HTTPD: sets environmental variable based on user supplied Proxy request header Tomcat: CGI sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6" ]
null
null
3.5
null
RHSA-2023:2867
Red Hat Security Advisory: postgresql-jdbc security update
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2015:2500
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2016:2640
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.3 on RHEL 6
undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
6.5
null
RHSA-2002:223
Red Hat Security Advisory: : Updated ypserv packages fixes memory leak
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2021:0381
Red Hat Security Advisory: RHV-M(ovirt-engine) 4.4.z security, bug fix, enhancement update [ovirt-4.4.4]
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
7.5
null
null
RHSA-2016:0455
Red Hat Security Advisory: ruby193 security update
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-actionpack: directory traversal in Action View, incomplete CVE-2016-0752 fix rubygem-actionpack: code injection vulnerability in Action View
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2017:0309
Red Hat Security Advisory: qemu-kvm security and bug fix update
Qemu: net: out of bounds read in net_checksum_calculate() Qemu: display: cirrus: oob access while doing bitblt copy backward mode
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.5
null
RHSA-2023:4035
Red Hat Security Advisory: nodejs:18 security update
c-ares: buffer overflow in config_sortlist() due to missing string length check c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs c-ares: 0-byte UDP payload Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:1609
Red Hat Security Advisory: p11-kit security, bug fix, and enhancement update
p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2020:1921
Red Hat Security Advisory: fontforge security update
fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
null
null
RHSA-2003:090
Red Hat Security Advisory: glibc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:2469
Red Hat Security Advisory: dhcp security update
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
8.8
null
null
RHSA-2024:3685
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: Object Request Broker (ORB) denial of service
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
5.9
null
null
RHSA-2019:2280
Red Hat Security Advisory: uriparser security update
uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2019:1187
Red Hat Security Advisory: libvirt security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
3.8
null
RHSA-2010:0488
Red Hat Security Advisory: samba and samba3x security update
samba: memory corruption vulnerability
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es", "cpe:/o:redhat:rhel_eus:5.3", "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
RHSA-2022:0443
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21
samba: Active Directory (AD) domain user could become root on domain members polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
7.8
null
null
RHSA-2014:0349
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC). This notification applies only to those customers with subscriptions for Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC).
[ "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2002:259
Red Hat Security Advisory: sendmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2019:3582
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: save registry file outside share as unprivileged user
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
4.2
null
RHSA-2007:0569
Red Hat Security Advisory: tomcat security update
tomcat examples jsp XSS tomcat host manager XSS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0343
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update
tomcat: multiple content-length header poisoning flaws PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application 6: JSM policy not respected by deployed applications
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2010:0146
Red Hat Security Advisory: kernel security and bug fix update
kernel: 32bit process on 64bit system can trigger a kernel panic kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: sctp remote denial of service kernel: DoS on x86_64
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2005:412
Red Hat Security Advisory: openmotif security update
libxpm buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:2033
Red Hat Security Advisory: patch security and bug fix update
patch: Out-of-bounds access in pch_write_line function in pch.c patch: Double free of memory in pch.c:another_hunk() causes a crash
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2005:867
Red Hat Security Advisory: gpdf security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:1652
Red Hat Security Advisory: libssh2 security update
libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2022:5908
Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.3.10)
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
RHSA-2020:2780
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
EAP: Vault system property security attribute value is revealed on CLI 'reload' command tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
7.6
5.4
null
RHSA-2019:1234
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary Code Execution vulnerability (APSB19-26)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2014:0323
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 security update
XStream: remote code execution due to insecure XML deserialization Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL
[ "cpe:/a:redhat:jboss_amq:6.0.0", "cpe:/a:redhat:jboss_fuse:6.0.0" ]
null
null
null
null
RHSA-2019:0436
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.1
null
RHSA-2024:5002
Red Hat Security Advisory: python3.11-setuptools security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2023:6429
Red Hat Security Advisory: libpq security update
postgresql: Client memory disclosure when connecting with Kerberos to modified server
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
3.7
null
null
RHSA-2024:11149
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
6.5
null
null
RHSA-2015:1249
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: bypass of mod_headers rules via chunked requests
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:0234
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints
[ "cpe:/a:redhat:jboss_bpms:6.0" ]
null
null
4.8
null
RHSA-2023:0021
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2017:0161
Red Hat Security Advisory: python-XStatic-jquery-ui security update
jquery-ui: cross-site scripting in dialog closeText
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
6.1
null
RHSA-2011:1000
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update
rgmanager: insecure library loading vulnerability
[ "cpe:/a:redhat:rhel_cluster:5" ]
null
null
null
null
RHSA-2018:3549
Red Hat Security Advisory: OpenShift Container Platform 3.10 security update
kubernetes: authentication/authorization bypass in the handling of non-101 responses
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
8.8
null
RHSA-2019:3391
Red Hat Security Advisory: libreswan security and bug fix update
libreswan: vulnerability in the processing of IKEv1 informational packets due to missing integrity check libreswan: null-pointer dereference by sending two IKEv2 packets
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
4.3
null
RHSA-2010:0785
Red Hat Security Advisory: quagga security update
quagga bgpd DoS (bgpd): Stack buffer overflow by processing certain Route-Refresh messages
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:0061
Red Hat Security Advisory: thunderbird security update
Mozilla: From address with encoded null character is cut off in message header display Mozilla: JavaScript Execution via RSS in mailbox:// origin Mozilla: Local path string can be leaked from RSS feed Mozilla: RSS Feed vulnerable to new line Injection
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2009:1075
Red Hat Security Advisory: httpd security update
httpd: mod_ssl per-connection memory leak for connections with zlib compression httpd: AllowOverride Options=IncludesNoExec allows Options Includes
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:1437
Red Hat Security Advisory: firefox security update
Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2024:1415
Red Hat Security Advisory: edk2 security update
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2013:1521
Red Hat Security Advisory: python-django security update
python-django: directory traversal with "ssi" template tag python-django: xss in is_safe_url function
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2022:0492
Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update
containernetworking-cni: Arbitrary path injection via type field in CNI configuration
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.2
null
null
RHSA-2024:2672
Red Hat Security Advisory: OpenShift Container Platform 4.14.24 packages and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS buildah: full container escape at build time cri-o: Arbitrary command injection via pod annotation jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
4.3
null
null
RHSA-2009:1186
Red Hat Security Advisory: nspr and nss security, bug fix, and enhancement update
nss regexp heap overflow firefox/nss: doesn't handle NULL in Common Name properly deprecate MD2 in SSL cert validation (Kaminsky)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:8544
Red Hat Security Advisory: thunderbird security update
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
6.1
null
RHSA-2023:4114
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update
openshift: OCP & FIPS mode
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
6.5
null
null
RHSA-2024:9820
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.8
null
null
RHSA-2023:4090
Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8" ]
null
7.5
null
null
RHSA-2024:6033
Red Hat Security Advisory: openldap security update
openldap: null pointer dereference in ber_memalloc_x function
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.1
null
null
RHSA-2024:1318
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.8 release and security update
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9" ]
null
7.5
null
null
RHSA-2021:2471
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP8 security update
libcurl: partial password leak over DNS on HTTP redirect curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification curl: Leak of authentication credentials in URL via automatic Referer curl: TLS 1.3 session ticket mix-up with HTTPS proxy host curl: Use-after-free in TLS session handling when using OpenSSL TLS backend
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
8.1
null
null
RHSA-2022:5491
Red Hat Security Advisory: rh-php73-php security and bug fix update
php: Local privilege escalation via PHP-FPM php: Special character breaks path in xml parsing php: Uninitialized array in pg_query_params() leading to RCE php: password of excessive length triggers buffer overflow leading to RCE
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.8
null
null