id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2005:284
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2014:1009
|
Red Hat Security Advisory: samba4 security update
|
samba: Uninitialized memory exposure samba: nmbd denial of service samba: smbd unicode path names denial of service samba: remote code execution in nmbd
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:176
|
Red Hat Security Advisory: firefox security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:1253
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 7
|
Resteasy: Yaml unmarshalling vulnerable to RCE
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 8.1 | null |
RHSA-2016:1098
|
Red Hat Security Advisory: jq security update
|
jq: heap-buffer-overflow in tokenadd() function
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2004:308
|
Red Hat Security Advisory: ipsec-tools security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1459
|
Red Hat Security Advisory: gnupg2 security update
|
GnuPG: read_block() corrupt key input validation gnupg: treats no-usage-permitted keys as all-usages-permitted GnuPG: infinite recursion in the compressed packet parser DoS
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:4059
|
Red Hat Security Advisory: virt:rhel security update
|
QEMU: slirp: networking out-of-bounds read information disclosure vulnerability QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5 | null | null |
RHSA-2017:0182
|
Red Hat Security Advisory: squid security update
|
squid: Information disclosure in HTTP request processing
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:6179
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update
|
snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2022:1934
|
Red Hat Security Advisory: mod_auth_mellon security update
|
mod_auth_mellon: Open Redirect vulnerability in logout URLs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
RHSA-2024:9566
|
Red Hat Security Advisory: libsoup security update
|
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2023:1970
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2016:2064
|
Red Hat Security Advisory: atomic-openshift security update
|
3: API server does not validate client-provided intermediate certificates correctly
|
[
"cpe:/a:redhat:openshift:3.1::el7",
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7"
] | null | null | 7.5 | null |
RHSA-2025:3132
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.6
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
|
[
"cpe:/a:redhat:logging:6.0::el9"
] | null | 7.5 | null | null |
RHSA-2005:756
|
Red Hat Security Advisory: cvs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:9070
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2016:1296
|
Red Hat Security Advisory: ocaml security update
|
ocaml: sizes arguments are sign-extended from 32 to 64 bits
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2523
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.2 servicemesh-proxy security update
|
nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2015:1853
|
Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 Retirement Notice
|
This is the final notification for the retirement of Red Hat Developer
Toolset Version 2. This notification applies only to those customers
subscribed to the channel for Red Hat Developer Toolset Version 2.
|
[] | null | null | null | null |
RHSA-2017:0621
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
qemu-kvm: Out-of-bounds read when creating weird vga screen surface
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1878
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: Combination of parameters and permissions can allow user to escape from the share path definition samba: smb client vulnerable to filenames containing path separators samba: Crash after failed character conversion at log level 3 or above
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | 5.3 | null |
RHSA-2021:2331
|
Red Hat Security Advisory: libldb security update
|
samba: Out of bounds read in AD DC LDAP server
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.1 | null | null |
RHSA-2023:5454
|
Red Hat Security Advisory: glibc security update
|
glibc: buffer overflow in ld.so leading to privilege escalation
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1898
|
Red Hat Security Advisory: java-17-openjdk security and bug fix update
|
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2016:0445
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 OpenSSL security update
|
openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | null | null |
RHSA-2022:1039
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
Openshift-Gitops: Improper access control allows admin privilege escalation argocd: path traversal and improper access control allows leaking out-of-bound files argocd: path traversal allows leaking out-of-bound files
|
[
"cpe:/a:redhat:openshift_gitops:1.2::el8"
] | null | 6.8 | null | null |
RHSA-2016:2138
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 5.3 | null |
RHSA-2023:4349
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: NULL dereference in xmlSchemaFixupComplexType libxml2: Hashing of empty dict strings isn't deterministic
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2024:9552
|
Red Hat Security Advisory: thunderbird security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2012:0690
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: insufficient data_len validation in sock_alloc_send_pskb()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0883
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update
|
PicketLink: XXE via insecure DocumentBuilderFactory usage
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2014:0704
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:0062
|
Red Hat Security Advisory: kernel security update
|
kernel: gro: fix ownership transfer kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:6162
|
Red Hat Security Advisory: python-urllib3 security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2022:7633
|
Red Hat Security Advisory: dnsmasq security and bug fix update
|
dnsmasq: Heap use after free in dhcp6_no_relay
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:8208
|
Red Hat Security Advisory: dovecot security and enhancement update
|
dovecot: Privilege escalation when similar master and non-master passdbs are used
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2025:3844
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 5.6 | null | null |
RHSA-2021:4162
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python-psutil: Double free because of refcount mishandling python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python: Information disclosure via pydoc python-pip: Incorrect handling of unicode separators in git references python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-ipaddress: Improper input validation of octal strings python-urllib3: ReDoS in the parsing of authority part of URL python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | 7 | null |
RHSA-2024:0962
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1981
|
Red Hat Security Advisory: nss, nss-util, and nspr security update
|
nss: use-after-poison in sec_asn1d_parse_leaf() (MFSA 2015-133) nss: ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings (MFSA 2015-133) nspr: heap-buffer overflow in PL_ARENA_ALLOCATE (MFSA 2015-133)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:8096
|
Red Hat Security Advisory: redis security and bug fix update
|
redis: Code injection via Lua script execution environment redis: Malformed Lua script can crash Redis
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.3 | null | null |
RHSA-2022:7071
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2022:7955
|
Red Hat Security Advisory: skopeo security and bug fix update
|
containers/storage: DoS via malicious image golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:7244
|
Red Hat Security Advisory: linux-firmware security update
|
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 6.5 | null | null |
RHSA-2013:1542
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: clickjacking vulnerability in SWAT samba: cross-site request forgery vulnerability in SWAT samba: DoS via integer overflow when reading an EA list
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:3032
|
Red Hat Security Advisory: binutils security, bug fix, and enhancement update
|
binutils: Improper bounds check in coffgen.c:coff_pointerize_aux() allows for denial of service when parsing a crafted COFF file binutils: integer overflow via an ELF file with corrupt dwarf1 debug information in libbfd library binutils: integer underflow or overflow via an ELF file with a corrupt DWARF FORM block in libbfd library binutils: NULL pointer dereference in swap_std_reloc_in function in aoutx.h resulting in crash binutils: Integer overflow in the display_debug_ranges function resulting in crash binutils: Crash in elf.c:bfd_section_from_shdr() with crafted executable binutils: Heap-base buffer over-read in dwarf.c:process_cu_tu_index() allows for denial of service via crafted file binutils: NULL pointer dereference in dwarf2.c:concat_filename() allows for denial of service via crafted file binutils: out of bounds memory write in peXXigen.c files binutils: NULL pointer dereference in elf.c binutils: Uncontrolled Resource Consumption in execution of nm
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.8 | null |
RHSA-2024:10861
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.2.GA)
|
An update for Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.2.GA).
The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products.
Red Hat Product Security has rated this update as having a security impact of Moderate.
|
[
"cpe:/a:redhat:camel_quarkus:3.15"
] | null | null | null | null |
RHSA-2019:3942
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.24 openshift security update
|
kubernetes: Schema info written with world-writeable permissions when cached
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 3.3 | null |
RHSA-2005:267
|
Red Hat Security Advisory: Evolution security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2974
|
Red Hat Security Advisory: gstreamer-plugins-bad-free security update
|
gstreamer-plugins-bad-free: Integer overflow when allocating render buffer in VMnc decoder gstreamer-plugins-bad-free: Memory corruption flaw in NSF decoder
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2024:1508
|
Red Hat Security Advisory: logging for Red Hat OpenShift security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 5.9 | null | null |
RHBA-2019:0327
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 images update
|
kube-rbac-proxy: Improper application of config allows for insecure ciphers and TLS 1.0
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 3.7 | null |
RHSA-2003:104
|
Red Hat Security Advisory: apache, openssl, php security update for Stronghold
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2018:3663
|
Red Hat Security Advisory: sos-collector security update
|
sos-collector: incorrect permissions set on newly created files
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2019:2829
|
Red Hat Security Advisory: kernel security update
|
kernel: vhost-net: guest to host kernel escape during migration
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.2 | null |
RHSA-2024:3312
|
Red Hat Security Advisory: glibc security update
|
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4 | null | null |
RHSA-2010:0578
|
Red Hat Security Advisory: freetype security update
|
freetype: invalid free vulnerability with possible heap corruption freetype: buffer overflow vulnerability freetype: integer overflow vulnerability in smooth/ftgrays.c freetype: heap buffer overflow vulnerability when processing certain font files Freetype demos multiple buffer overflows Freetype ftmulti buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1460
|
Red Hat Security Advisory: dhcp security update
|
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7.5 | null |
RHSA-2003:192
|
Red Hat Security Advisory: : Updated KDE packages fix security issue
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2023:1503
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.34 packages and security update
|
cri-o: /etc/passwd tampering privesc
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.8 | null | null |
RHSA-2020:3389
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 7.1 | null | null |
RHSA-2022:8866
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-XStatic-Angular) security update
|
AngularJS: Prototype pollution in merge function could result in code injection
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2021:2584
|
Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update
|
ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:0833
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.5 | null |
RHSA-2024:0880
|
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.31.1 security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2025:1285
|
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
|
[
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 8.2 | null | null |
RHSA-2018:2112
|
Red Hat Security Advisory: firefox security update
|
Mozilla: address bar username and password spoofing in reader mode Mozilla: Media recorder segmentation fault when track type is changed during capture Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 Skia: Heap buffer overflow rasterizing paths in SVG Mozilla: Buffer overflow using computed size of canvas element Mozilla: Use-after-free using focus() Mozilla: Integer overflow in SSSE3 scaler Mozilla: Use-after-free when appending DOM nodes Mozilla: CSRF attacks through 307 redirects and NPAPI plugins Mozilla: Compromised IPC child process can list local filenames Mozilla: Invalid data handling during QCMS transformations
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.1 | null |
RHSA-2023:0944
|
Red Hat Security Advisory: kernel security update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2023:1661
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.0 release and security update
|
WildFly: possible information disclosure jetty-http: improver hostname input handling keycloak: path traversal via double URL encoding springframework: DoS via data binding to multipartFile or servlet part springframework: DoS with STOMP over WebSocket
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 6.5 | null | null |
RHSA-2021:3949
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.12 security fixes and container updates
|
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Out of bounds read in lua debugger protocol parser redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
|
[
"cpe:/a:redhat:acm:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2021:1306
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2023:1110
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2024:8358
|
Red Hat Security Advisory: NetworkManager-libreswan security update
|
NetworkManager-libreswan: Local privilege escalation via leftupdown
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2023:1770
|
Red Hat Security Advisory: openvswitch3.1 security update
|
openvswitch: ip proto 0 triggers incorrect handling
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.2 | null | null |
RHSA-2021:5045
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2022:5004
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 security update
|
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements envoy: Segfault in GrpcHealthCheckerImpl envoy: Decompressors can be zip bombed envoy: oauth filter allows trivial bypass envoy: oauth filter calls continueDecoding() from within decodeHeaders() Istio: Unsafe memory access in metadata exchange.
|
[
"cpe:/a:redhat:service_mesh:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2016:1779
|
Red Hat Security Advisory: Red Hat CloudForms 3.x - 6 Month End Of Life Notice
|
This is the 6 Month notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x (3.0, 3.1 and 3.2).
|
[
"cpe:/a:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2025:3937
|
Red Hat Security Advisory: kernel security update
|
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.1 | null | null |
RHBA-2021:3003
|
Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.8.0 container images bug fix and enhancement update
|
kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 noobaa-core: Cross-site scripting vulnerability with noobaa management URL golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader
|
[
"cpe:/a:redhat:openshift_container_storage:4.8::el8"
] | null | 7.5 | null | null |
RHSA-2015:0835
|
Red Hat Security Advisory: openstack-swift security update
|
openstack-swift: Swift metadata constraints are not correctly enforced
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2007:0494
|
Red Hat Security Advisory: kdebase security update
|
kdebase3 flash-player interaction problem
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4965
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.6 bug fix and security update
|
go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6 | null | null |
RHSA-2017:0177
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 8.8 | null |
RHSA-2022:0899
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Use-after-free of ID and IDREF attributes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
RHSA-2024:10518
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.7 bug fix and security update
|
go-retryablehttp: url might write sensitive information to log file QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass cross-spawn: regular expression denial of service
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 4.4 | 7.5 | null |
RHSA-2023:4154
|
Red Hat Security Advisory: bind security update
|
bind: named's configured cache size limit can be significantly exceeded
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2005:747
|
Red Hat Security Advisory: slocate security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2020:2990
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11.248 bug fix and enhancement update
|
jenkins-credentials-binding-plugin: information disclosure in build log when build contains no build steps jenkins-credentials-binding-plugin: improper masking of secrets
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 4.3 | null | null |
RHSA-2024:6721
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.5 | null | null |
RHSA-2021:0073
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2007:0164
|
Red Hat Security Advisory: mod_jk security update
|
security flaw
|
[
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2024:11119
|
Red Hat Security Advisory: gstreamer1-plugins-good security update
|
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.5 | null | null |
RHSA-2018:2523
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
openstack-keystone: Information Exposure through /v3/OS-FEDERATION/projects
|
[
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.3 | null |
RHSA-2020:3475
|
Red Hat Security Advisory: bind security update
|
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.5 | null | null |
RHSA-2017:2004
|
Red Hat Security Advisory: git security and bug fix update
|
git: git-prompt.sh does not sanitize branch names in $PS1 git: Escape out of git-shell
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2017:1125
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.8 | null |
RHBA-2005:447
|
Red Hat Bug Fix Advisory: Updated cdrtools packages
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:4687
|
Red Hat Security Advisory: oddjob security, bug fix, and enhancement update
|
oddjob: race condition in oddjob_selinux_mkdir function in mkhomedir.c can lead to symlink attack
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.3 | null | null |
RHEA-2015:2126
|
Red Hat Enhancement Advisory: elfutils bug fix and enhancement update
|
elfutils: directory traversal in read_long_names()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.