id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:7855
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 9
|
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 7.7 | null | null |
RHSA-2021:1512
|
Red Hat Security Advisory: postgresql security update
|
postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2023:7878
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2022:1153
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.36 security update
|
haproxy: Denial of service via set-cookie2 header
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 7.5 | null | null |
RHSA-2021:1597
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2024:1317
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability libxml2: crafted xml can cause global buffer overflow curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status libxml2: use-after-free in XMLReader
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2023:2633
|
Red Hat Security Advisory: libreswan security update
|
libreswan: remote DoS via crafted TS payload with an incorrect selector length
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2019:3901
|
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Vert.x 3.8.3 security update
|
infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 7.5 | null |
RHSA-2010:0458
|
Red Hat Security Advisory: perl security update
|
perl: File:: Path rmtree race condition (CVE-2005-0448) reintroduced after upstream rebase to 5.8.8-1 perl: File:: Path rmtree race condition (CVE-2004-0452) reintroduced after upstream rebase to 5.8.8-1 Safe: Intended restriction bypass via object references perl: Safe restriction bypass when reference to subroutine in compartment is called from outside
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2008:0136
|
Red Hat Security Advisory: tk security update
|
Tk GIF processing buffer overflow tk: GIF handling buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4998
|
Red Hat Security Advisory: wget security update
|
wget: Misinterpretation of input may lead to improper behavior
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 5.5 | null | null |
RHSA-2019:3007
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift-enterprise-builder-container security update
|
atomic-openshift: OpenShift builds don't verify SSH Host Keys for the git repository containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 6.4 | null |
RHSA-2021:0476
|
Red Hat Security Advisory: dotnet5.0 security and bugfix update
|
dotnet: certificate chain building recursion Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2025:2753
|
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.19.0 release
|
katex: \htmlData does not validate attribute names in KaTeX
|
[
"cpe:/a:redhat:openshift_devspaces:3::el9"
] | null | 6.3 | null | null |
RHSA-2020:1113
|
Red Hat Security Advisory: bash security update
|
bash: BASH_CMD is writable in restricted bash shells
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2023:1365
|
Red Hat Security Advisory: nss security and bug fix update
|
nss: Arbitrary memory write via PKCS 12
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2022:0075
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Use-after-free leading to arbitrary code execution
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2022:7025
|
Red Hat Security Advisory: firefox security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2021:2119
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.6 (tripleo-ansible) security update
|
tripleo-ansible: ansible.log file is visible to unprivileged users
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2019:3044
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update on RHEL 6
|
undertow: Information leak in requests for directories without trailing slashes jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | null | 5 | null |
RHSA-2017:2669
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: ext4 filesystem page fault race condition with fallocate call. kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c kernel: Use after free in SCSI generic device interface kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user kernel: Memory leaks in xfs_attr_list.c error paths kernel: netlink: double-free in netlink_dump kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c kernel: ping socket / AF_LLC connect() sin_family race kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) kernel: ipv4: Invalid IP options could cause skb->dst drop kernel: Race condition between multiple sys_perf_event_open() calls kernel: NULL pointer dereference in keyring_search_aux function kernel: scsi: Stack-based buffer overflow in sg_ioctl function kernel: ext4: power failure during write(2) causes on-disk information leak kernel: a race between inotify_handle_event() and sys_rename() kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.5 | null |
RHSA-2024:4522
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
python-jwcrypto: malicious JWE token can cause denial of service jinja2: accepts keys containing non-attribute characters requests: subsequent requests to the same host ignore cert verification
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 5.6 | null | null |
RHSA-2002:175
|
Red Hat Security Advisory: : Updated nss_ldap packages fix buffer overflow
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2016:0369
|
Red Hat Security Advisory: rabbitmq-server security and bug fix update
|
RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2003:209
|
Red Hat Security Advisory: : : : updated ghostscript packages fix vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2021:1373
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null |
RHBA-2022:5747
|
Red Hat Bug Fix Advisory: .NET 6.0 bugfix update
|
eventsource: Exposure of Sensitive Information
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 9.3 | null | null |
RHSA-2003:234
|
Red Hat Security Advisory: : Updated semi packages fix vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:2524
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-proxy security update
|
nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2014:0626
|
Red Hat Security Advisory: openssl097a and openssl098e security update
|
openssl: SSL/TLS MITM vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:3353
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.9 security fixes and container updates
|
vm2: Inspect Manipulation vm2: Sandbox Escape
|
[
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 9.8 | null | null |
RHSA-2024:7182
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.35 packages and security update
|
containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 6.1 | null | null |
RHSA-2012:1455
|
Red Hat Security Advisory: gegl security update
|
gegl: Integer overflow, leading to heap-based buffer overflow by parsing PPM image headers
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:4770
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | null | 8.8 | null |
RHSA-2023:7408
|
Red Hat Security Advisory: samba security update
|
samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 6.5 | null | null |
RHSA-2012:0144
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: universal cross-site scripting flaw (APSB12-03)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:6914
|
Red Hat Security Advisory: python3.11-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2018:0676
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: unlimiting the stack disables ASLR kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: memory leak when merging buffers in SCSI IO vectors kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker kernel: Missing permission check in move_pages system call kernel: Null pointer dereference in rngapi_reset function kernel: vfs: BUG in truncate_inode_pages_range() and fuse client kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: dereferencing NULL payload with nonzero length kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ Kernel: KVM: DoS via write flood to I/O port 0x80 kernel: Stack information leak in the EFS element kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 4.7 | null |
RHSA-2013:0004
|
Red Hat Security Advisory: tomcat6 security update
|
Web: Bypass of security constraints
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.0"
] | null | null | null | null |
RHSA-2010:0681
|
Red Hat Security Advisory: firefox security update
|
Mozilla Dangling pointer vulnerability in nsTreeSelection (MFSA 2010-54) Mozilla SJOW creates scope chains ending in outer object (MFSA 2010-59) Mozilla Information leak via XMLHttpRequest statusText (MFSA 2010-63) Mozilla Frameset integer overflow vulnerability (MFSA 2010-50) Mozilla Crash and remote code execution in normalizeDocument (MFSA 2010-57) Mozilla Dangling pointer vulnerability using DOM plugin array (MFSA 2010-51) Mozilla UTF-7 XSS by overriding document charset using <object> type attribute (MFSA 2010-61) Mozilla Copy-and-paste or drag-and-drop into designMode document allows XSS (MFSA 2010-62) nsTextFrameUtils:: TransformText (MFSA 2010-53) Mozilla Dangling pointer vulnerability in nsTreeContentView (MFSA 2010-56) Mozilla XUL tree removal crash and remote code execution (MFSA 2010-55) Mozilla Miscellaneous memory safety hazards
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:4941
|
Red Hat Security Advisory: subversion:1.14 security update
|
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3074
|
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
|
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 5.3 | null |
RHSA-2024:6840
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 4.4 | null | null |
RHSA-2003:225
|
Red Hat Security Advisory: : : : Updated LPRng packages fix psbanner vulnerability
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2020:4185
|
Red Hat Security Advisory: spice and spice-gtk security update
|
spice: multiple buffer overflow vulnerabilities in QUIC decoding code
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 6.6 | null | null |
RHSA-2014:1370
|
Red Hat Security Advisory: Apache POI security update
|
apache-poi: XML eXternal Entity (XXE) flaw apache-poi: entity expansion (billion laughs) flaw
|
[
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHBA-2019:0944
|
Red Hat Bug Fix Advisory: Red Hat OpenStack Platform 14 bug fix and enhancement advisory
|
python-novajoin: novajoin API lacks access control
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 7.1 | null |
RHSA-2017:0366
|
Red Hat Security Advisory: kernel security update
|
kernel: use after free in dccp protocol
|
[
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.5::server"
] | null | null | 7.8 | null |
RHSA-2021:3147
|
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
|
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 5.5 | null | null |
RHSA-2007:0087
|
Red Hat Security Advisory: ekiga security update
|
security flaw Ekiga format string flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2024:1647
|
Red Hat Security Advisory: bind9.16 security update
|
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2023:1978
|
Red Hat Security Advisory: haproxy security update
|
haproxy: segfault DoS haproxy: request smuggling attack in HTTP/1 header parsing
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.2 | null | null |
RHSA-2013:1803
|
Red Hat Security Advisory: libjpeg-turbo security update
|
libjpeg: information leak (read of uninitialized memory) libjpeg: information leak (read of uninitialized memory)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:0483
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: timing side channel attack in the ECDSA signature generation openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2003:021
|
Red Hat Security Advisory: krb5 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:1074
|
Red Hat Security Advisory: 389-ds:1.4 security update
|
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 5.5 | null | null |
RHSA-2018:1345
|
Red Hat Security Advisory: kernel security update
|
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.8 | null |
RHSA-2005:080
|
Red Hat Security Advisory: cpio security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:4251
|
Red Hat Security Advisory: openjpeg2 security update
|
openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode() openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes() openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | 3.3 | null |
RHSA-2020:1942
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.3 presto-container security update
|
operator-framework/presto: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 7 | null | null |
RHSA-2024:11193
|
Red Hat Security Advisory: mpg123 security update
|
mpg123: Buffer overflow when writing decoded PCM samples
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.7 | null | null |
RHSA-2021:1756
|
Red Hat Security Advisory: qt5-qtbase security and bug fix update
|
qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2022:0339
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.19 security update
|
jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.8 | null | null |
RHSA-2009:1505
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
OpenJDK RSA public key length denial-of-service (6497740) JDK: XML parsing Denial-Of-Service (6845701)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:11219
|
Red Hat Security Advisory: edk2:20240524 security update
|
edk2: Integer overflows in PeCoffLoaderRelocateImage
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2025:0535
|
Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.15.0
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:cert_manager:1.15::el9"
] | null | 7.5 | null | null |
RHSA-2022:6781
|
Red Hat Security Advisory: bind9.16 security update
|
bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2021:1879
|
Red Hat Security Advisory: python38:3.8 security update
|
python: CRLF injection via HTTP request method in httplib/http.client python-lxml: mXSS due to the use of improper parser python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2023:7334
|
Red Hat Security Advisory: rh-varnish6-varnish security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2019:2552
|
Red Hat Security Advisory: OpenShift Container Platform 3.10 atomic-openshift-web-console security update
|
xterm.js: Mishandling of special characters allows for remote code execution
|
[
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 7.5 | null |
RHSA-2018:0515
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2019:3476
|
Red Hat Security Advisory: squid:4 security and bug fix update
|
squid: XSS via user_name or auth parameter in cachemgr.cgi
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.3 | null |
RHSA-2009:1061
|
Red Hat Security Advisory: freetype security update
|
freetype: multiple integer overflows
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4670
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0754
|
Red Hat Security Advisory: gnupg security update
|
: gnupg2 < 2.0.1 buffer overflow security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1551
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Favicon network connection persists when page is closed (MFSA 2016-62) Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) Mozilla: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77) Mozilla: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64) Mozilla: Stack underflow during 2D graphics rendering (MFSA 2016-67) Mozilla: Use-after-free when using alt key and toplevel menus (MFSA 2016-70) Mozilla: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72) Mozilla: Use-after-free in service workers with nested sync events (MFSA 2016-73) Mozilla: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76) Mozilla: Type confusion in display transformation (MFSA 2016-78) Mozilla: Use-after-free when applying SVG effects (MFSA 2016-79) Mozilla: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2022:1628
|
Red Hat Security Advisory: web-admin-build security update
|
golang: net/http: limit growth of header canonicalization cache
|
[
"cpe:/a:redhat:storage:3.5:wa:el7"
] | null | 7.5 | null | null |
RHBA-2022:7667
|
Red Hat Bug Fix Advisory: qatzip bug fix and enhancement update
|
qatzip: local privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2020:2062
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 7.5 | null |
RHSA-2024:4427
|
Red Hat Security Advisory: fence-agents security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2023:6542
|
Red Hat Security Advisory: perl-HTTP-Tiny security update
|
http-tiny: insecure TLS cert default
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.8 | null | null |
RHSA-2019:4154
|
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
|
kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: use-after-free Read in vhost_transport_send_pkt kernel: Information leak in cdrom_ioctl_drive_status Kernel: KVM: OOB memory access via mmio ring buffer
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7 | null |
RHSA-2024:8707
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2022:7720
|
Red Hat Security Advisory: e2fsprogs security and bug fix update
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.8 | null | null |
RHSA-2023:1888
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.3 security fixes and bug fixes
|
RHACM: unauthenticated SSRF in console API endpoint http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:acm:2.7::el8"
] | null | 9.8 | null | null |
RHSA-2024:2936
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0511
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2019:1650
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 2.8 | null |
RHSA-2022:7053
|
Red Hat Security Advisory: OpenJDK 17.0.5 Security Update for Portable Linux Builds
|
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
|
[
"cpe:/a:redhat:openjdk:17"
] | null | 3.7 | null | null |
RHSA-2023:3935
|
Red Hat Security Advisory: python3 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2021:0657
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:7054
|
Red Hat Security Advisory: OpenJDK 11.0.17 Security Update for Portable Linux Builds
|
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 3.7 | null | null |
RHSA-2022:4816
|
Red Hat Security Advisory: container-tools:3.0 security update
|
psgo: Privilege escalation in 'podman top' podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 4.8 | null | null |
RHSA-2023:4449
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 8.1 | null | null |
RHSA-2020:3224
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.1 | null | null |
RHSA-2022:2211
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in RDMA listen() kernel: cgroups v1 release_agent feature may allow privilege escalation
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7 | null | null |
RHSA-2024:1385
|
Red Hat Security Advisory: ovn23.06 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2023:5728
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2020:0912
|
Red Hat Security Advisory: tomcat6 security update
|
tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.6 | null | null |
RHSA-2024:3846
|
Red Hat Security Advisory: python-idna security update
|
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.