id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2006:0749
|
Red Hat Security Advisory: tar security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:2431
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | 6.5 | null |
RHSA-2022:6504
|
Red Hat Security Advisory: openvswitch2.17 security update
|
dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2021:0848
|
Red Hat Security Advisory: kernel security update
|
kernel: performance counters race condition use-after-free
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7 | null | null |
RHSA-2019:0036
|
Red Hat Security Advisory: source-to-image security, bug fix, and enhancement update
|
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 9.9 | null |
RHSA-2023:4947
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2022:8915
|
Red Hat Security Advisory: Red Hat Certificate System 9.7 security update
|
pki-core: access to external entities when parsing XML can lead to XXE
|
[
"cpe:/a:redhat:certificate_system:9.7::el7"
] | null | 7.5 | null | null |
RHSA-2024:10244
|
Red Hat Security Advisory: pam:1.5.1 security update
|
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2022:6180
|
Red Hat Security Advisory: rsync security update
|
rsync: remote arbitrary files write inside the directories of connecting peers
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2014:1671
|
Red Hat Security Advisory: rsyslog5 and rsyslog security update
|
rsyslog: remote syslog PRI vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:1068
|
Red Hat Security Advisory: pcre security update
|
pcre miscalculation of memory requirements for malformed Posix character class pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference pcre integer overflow pcre miscalculation of memory requirements if options are changed during pattern compilation pcre regular expression flaws
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0103
|
Red Hat Security Advisory: libvirt security and bug fix update
|
qemu: job usage issue in several APIs leading to libvirtd crash libvirt: denial of service with keepalive
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0258
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: mod_lua: Possible buffer overflow when parsing multipart content
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2024:11170
|
Red Hat Security Advisory: unbound security update
|
unbound: Unbounded name compression could lead to Denial of Service
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 5.3 | null | null |
RHSA-2019:0600
|
Red Hat Security Advisory: CloudForms 4.6.9 security, bug fix and enhancement update
|
activejob: Information Exposure through deserialization using GlobalId
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 4.3 | null |
RHSA-2017:0532
|
Red Hat Security Advisory: rabbitmq-server security and bug fix update
|
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 6.5 | null |
RHSA-2013:0831
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1822
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 3.7 | null | null |
RHSA-2003:286
|
Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2012:1456
|
Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #3
|
GlusterFS: insecure temporary file creation
|
[
"cpe:/a:redhat:storage:2.0:server:el6",
"cpe:/a:redhat:storage:2:client:el5",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | null | null |
RHSA-2010:0271
|
Red Hat Security Advisory: kvm security, bug fix and enhancement update
|
libspice: Insufficient guest provided memory mappings boundaries validations qemu: Improper handling of erroneous data provided by Linux virtio-net driver
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2014:0922
|
Red Hat Security Advisory: httpd24-httpd security update
|
httpd: mod_cache NULL pointer dereference crash httpd: mod_proxy denial of service httpd: mod_deflate denial of service httpd: mod_status heap-based buffer overflow httpd: mod_cgid denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2022:0634
|
Red Hat Security Advisory: rpm security update
|
rpm: RPM does not require subkeys to have a valid binding signature
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 4.4 | null | null |
RHSA-2024:3972
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0588
|
Red Hat Security Advisory: gnutls security update
|
gnutls: TLS CBC padding timing attack (lucky-13)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6610
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: buffer overflow in nft_set_desc_concat_parse() kernel: heap overflow in nft_set_elem_init()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2025:1314
|
Red Hat Security Advisory: doxygen security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.1 | null | null |
RHSA-2020:1036
|
Red Hat Security Advisory: texlive security update
|
texlive: Buffer overflow in t1_check_unusual_charstring function in writet1.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2024:1697
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.3 security update
|
CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 6.5 | null | null |
RHSA-2023:4888
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2024:3008
|
Red Hat Security Advisory: pmix security update
|
pmix: race condition allows attackers to obtain ownership of arbitrary files
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2013:0682
|
Red Hat Security Advisory: jakarta-commons-httpclient security update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | 3.7 | null |
RHSA-2021:1072
|
Red Hat Security Advisory: libldb security update
|
samba: Out of bounds read in AD DC LDAP server
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
RHSA-2018:2089
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 8.1 | null |
RHSA-2011:0162
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: tipc: heap overflow in tipc_msg_build() kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: ipc/shm.c: reading uninitialized stack memory kernel: ipc/compat*.c: reading uninitialized stack memory kernel: drivers/serial/serial_core.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: socket filters infoleak kernel: missing tty ops write function presence check in hci_uart_tty_open() kernel: unix socket local dos
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5530
|
Red Hat Security Advisory: Logging Subsystem 5.7.7 - Red Hat OpenShift security update
|
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 7.5 | null | null |
RHSA-2023:4641
|
Red Hat Security Advisory: rh-dotnet60-dotnet security, bug fix, and enhancement update
|
dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 7.5 | null | null |
RHSA-2011:1418
|
Red Hat Security Advisory: kernel security update
|
kernel: panic occurs when clock_gettime() is called
|
[
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2016:1089
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 security update
|
openssl: use-after-free on invalid EC private key import libxml2: CPU exhaustion when processing specially crafted XML input tomcat: directory disclosure tomcat: Session fixation tomcat: CSRF token leak libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey libxml2: Heap-based buffer overflow in xmlParseXmlDecl libxml2: Heap-based buffer overflow in xmlGROW libxml2: Heap buffer overflow in xmlParseMisc libxml2: Out-of-bounds memory access libxml2: heap-based buffer overflow in xmlParseConditionalSections() libxml2: DoS caused by incorrect error detection during XZ decompression libxml2: Buffer overread with XML parser in xmlNextChar libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration libxml2: out-of-bounds memory access when parsing an unclosed HTML comment tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext()
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | 6.3 | null |
RHSA-2004:609
|
Red Hat Security Advisory: freeradius security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
RHSA-2021:2732
|
Red Hat Security Advisory: kernel security update
|
kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2003:231
|
Red Hat Security Advisory: semi security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:0663
|
Red Hat Security Advisory: sssd security and bug fix update
|
sssd: simple access provider flaw prevents intended ACL use when client to an AD provider
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:3367
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.2 bug fix and security update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2003:235
|
Red Hat Security Advisory: : Updated KDE packages fix security issue
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2016:2035
|
Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update
|
Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization camel-xstream: Java object de-serialization vulnerability leads to RCE Camel: Java object deserialisation in Jetty/Servlet bouncycastle: Invalid curve attack allowing to extract private keys JGroups: Authorization bypass bsh2: remote code execution via deserialization shiro: Security constraint bypass
|
[
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 7.3 | null |
RHSA-2020:4220
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.27 openshift-jenkins-2-container security update
|
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.4 | null | null |
RHBA-2022:5876
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.10.26 extras update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2020:1979
|
Red Hat Security Advisory: git security update
|
git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1379
|
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
|
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | null | null |
RHSA-2024:5908
|
Red Hat Security Advisory: bind security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2019:2304
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: timing side channel attack in the DSA signature algorithm openssl: 0-byte record padding oracle
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | 5.1 | null |
RHSA-2021:3142
|
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
|
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2010:0331
|
Red Hat Security Advisory: GFS-kernel security and bug fix update
|
kernel: bug in GFS/GFS2 locking code leads to dos
|
[
"cpe:/a:redhat:rhel_global_file_system:4"
] | null | null | null | null |
RHSA-2023:5030
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
ArgoCD: secrets can be leak through kubectl.kubernetes.io/last-applied-configuration ArgoCD: Denial of Service to Argo CD repo-server
|
[
"cpe:/a:redhat:openshift_gitops:1.8::el8"
] | null | 6.5 | null | null |
RHSA-2025:0166
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2729
|
Red Hat Security Advisory: openstack-manila and openstack-manila security update
|
openstack-manila: User with share-network UUID is able to show, create and delete shares
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 8.3 | null | null |
RHSA-2022:0400
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
|
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 6.6 | null | null |
RHSA-2014:1147
|
Red Hat Security Advisory: squid security update
|
squid: assertion failure in Range header processing (SQUID-2014:2)
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:1537
|
Red Hat Security Advisory: Red Hat OpenStack Platform director security update
|
rhosp-director: libvirtd is deployed with no authentication
|
[
"cpe:/a:redhat:openstack-director:7::el7"
] | null | null | 9.9 | null |
RHSA-2021:1881
|
Red Hat Security Advisory: poppler and evince security, bug fix, and enhancement update
|
poppler: pdftohtml: access to uninitialized pointer could lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:5976
|
Red Hat Security Advisory: Service Telemetry Framework 1.5.2 security update
|
golang: crypto/tls: large handshake records may cause panics golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:service_telemetry_framework:1.5::el8"
] | null | 7.5 | null | null |
RHSA-2023:6105
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP1 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.5 | null | null |
RHSA-2003:180
|
Red Hat Security Advisory: sharutils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2014:0581
|
Red Hat Security Advisory: python-django-horizon security update
|
openstack-horizon: XSS in Horizon orchestration dashboard when using a malicious template
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2022:4796
|
Red Hat Security Advisory: nodejs:16 security update
|
npm: npm ci succeeds when package-lock.json doesn't match package.json
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2020:5528
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 8
|
keycloak: Account REST API can update user metadata attributes
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | 4.2 | null | null |
RHSA-2008:1047
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Linux-specific code execution flaw via crafted SWF file
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:0155
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update
|
keycloak-server-spi-private: ECP SAML binding bypasses authentication flows Keycloak: Incorrect authorization allows unpriviledged users to create other users resteasy: Error message exposes endpoint class information xml-security: XPath Transform abuse allows for information disclosure
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 7.5 | null | null |
RHBA-2015:0038
|
Red Hat Bug Fix Advisory: Red Hat Storage 3.0 enhancement and bug fix update #3
|
glusterfs: fragment header infinite loop DoS
|
[
"cpe:/a:redhat:storage:2:client:el5",
"cpe:/a:redhat:storage:3:client:el6",
"cpe:/a:redhat:storage:3:nagios:el6",
"cpe:/a:redhat:storage:3:server:el6"
] | null | null | null | null |
RHSA-2014:1008
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: remote code execution in nmbd
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:5810
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.64 security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm jinja2: accepts keys containing non-attribute characters python-werkzeug: user may execute code on a developer's machine
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2023:6595
|
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
|
hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi amd: Return Address Predictor vulnerability leading to information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.6 | null | null |
RHSA-2022:8492
|
Red Hat Security Advisory: python39:3.9 security update
|
python: local privilege escalation via the multiprocessing forkserver start method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2024:10750
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2021:3676
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8.8 | null | null |
RHSA-2024:10535
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.70 security update
|
waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2024:6203
|
Red Hat Security Advisory: emacs security update
|
emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2022:1462
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 7
|
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 5.9 | null | null |
RHSA-2007:0069
|
Red Hat Security Advisory: openoffice.org security update
|
security flaw security flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2022:1139
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 8.3 | null | null |
RHSA-2012:0309
|
Red Hat Security Advisory: sudo security and bug fix update
|
sudo: does not ask for password on GID changes
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0002
|
Red Hat Security Advisory: RHN Proxy Server 4 - End Of Life
|
This is the End Of Life notification for RHN Proxy Server 4.
|
[
"cpe:/a:redhat:network_proxy:4.2::el3",
"cpe:/a:redhat:network_proxy:4.2::el4"
] | null | null | null | null |
RHSA-2007:0747
|
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
|
httpd: out of bounds read
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1764
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2018:2526
|
Red Hat Security Advisory: mutt security update
|
mutt: Remote code injection vulnerability to an IMAP mailbox mutt: Remote Code Execution via backquote characters mutt: POP body caching path traversal vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2020:1981
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in storage chromium-browser: Use after free in task scheduling
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2022:4909
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.52 paackages and security update
|
credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.3 | null | null |
RHSA-2017:0341
|
Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support One-Month Notice
|
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1.
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2011:0181
|
Red Hat Security Advisory: openoffice.org and openoffice.org2 security update
|
OpenOffice.org: directory traversal flaws in handling of XSLT jar filter descriptions and OXT extension files OpenOffice.org: Array index error by insecure parsing of broken rtf tables OpenOffice.org: Integer signedness error (crash) by processing certain RTF tags OpenOffice.org: Heap-based buffer overflow by processing *.doc files with WW8 list styles with specially-crafted count of list levels OpenOffice.org: Array index error by scanning document typography information of certain *.doc files OpenOffice.org: heap based buffer overflow when parsing TGA files
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:2654
|
Red Hat Security Advisory: OpenShift Container Platform 3.6 security and bug fix update
|
atomic-openshift: oc patch with json causes masterapi service crash
|
[
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 7.7 | null |
RHSA-2023:6976
|
Red Hat Security Advisory: libfastjson security update
|
libfastjson: integer overflow and out-of-bounds write via a large JSON file
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2005:766
|
Red Hat Security Advisory: squid security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:4690
|
Red Hat Security Advisory: qt5-qtbase and qt5-qtwebsockets security and bug fix update
|
qt: XML entity expansion vulnerability qt5-qtwebsockets: websocket implementation allows only limited size for frames and messages therefore attacker can cause DOS qt: files placed by attacker can influence the working directory and lead to malicious code execution qt: files placed by attacker can influence the working directory and lead to malicious code execution qt5: incorrectly calls SSL_shutdown() in OpenSSL mid-handshake causing denial of service in TLS applications
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHEA-2015:2126
|
Red Hat Enhancement Advisory: elfutils bug fix and enhancement update
|
elfutils: directory traversal in read_long_names()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:3151
|
Red Hat Security Advisory: sssd security update
|
sssd: shell command injection in sssctl
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2014:1635
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:31.2) (MFSA 2014-74) Mozilla: Buffer overflow during CSS manipulation (MFSA 2014-75) Mozilla: Web Audio memory corruption issues with custom waveforms (MFSA 2014-76) Mozilla: Out-of-bounds write with WebM video (MFSA 2014-77) Mozilla: Use-after-free interacting with text directionality (MFSA 2014-79) Mozilla: Accessing cross-origin objects via the Alarms API (MFSA 2014-82)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:3500
|
Red Hat Security Advisory: ruby:3.0 security update
|
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.6 | null | null |
RHSA-2014:0512
|
Red Hat Security Advisory: kernel security update
|
kernel: pty layer race condition leading to memory corruption
|
[
"cpe:/o:redhat:rhel_eus:6.3::computenode",
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHSA-2021:2659
|
Red Hat Security Advisory: linuxptp security update
|
linuxptp: missing length check of forwarded messages
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.