id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2006:0749
Red Hat Security Advisory: tar security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:2431
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
6.5
null
RHSA-2022:6504
Red Hat Security Advisory: openvswitch2.17 security update
dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2021:0848
Red Hat Security Advisory: kernel security update
kernel: performance counters race condition use-after-free
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7
null
null
RHSA-2019:0036
Red Hat Security Advisory: source-to-image security, bug fix, and enhancement update
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
9.9
null
RHSA-2023:4947
Red Hat Security Advisory: thunderbird security update
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2022:8915
Red Hat Security Advisory: Red Hat Certificate System 9.7 security update
pki-core: access to external entities when parsing XML can lead to XXE
[ "cpe:/a:redhat:certificate_system:9.7::el7" ]
null
7.5
null
null
RHSA-2024:10244
Red Hat Security Advisory: pam:1.5.1 security update
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.4
null
null
RHSA-2022:6180
Red Hat Security Advisory: rsync security update
rsync: remote arbitrary files write inside the directories of connecting peers
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2014:1671
Red Hat Security Advisory: rsyslog5 and rsyslog security update
rsyslog: remote syslog PRI vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2007:1068
Red Hat Security Advisory: pcre security update
pcre miscalculation of memory requirements for malformed Posix character class pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference pcre integer overflow pcre miscalculation of memory requirements if options are changed during pattern compilation pcre regular expression flaws
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0103
Red Hat Security Advisory: libvirt security and bug fix update
qemu: job usage issue in several APIs leading to libvirtd crash libvirt: denial of service with keepalive
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:0258
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_lua: Possible buffer overflow when parsing multipart content
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
9.8
null
null
RHSA-2024:11170
Red Hat Security Advisory: unbound security update
unbound: Unbounded name compression could lead to Denial of Service
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb" ]
null
5.3
null
null
RHSA-2019:0600
Red Hat Security Advisory: CloudForms 4.6.9 security, bug fix and enhancement update
activejob: Information Exposure through deserialization using GlobalId
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
4.3
null
RHSA-2017:0532
Red Hat Security Advisory: rabbitmq-server security and bug fix update
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
6.5
null
RHSA-2013:0831
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:1822
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
3.7
null
null
RHSA-2003:286
Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2012:1456
Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #3
GlusterFS: insecure temporary file creation
[ "cpe:/a:redhat:storage:2.0:server:el6", "cpe:/a:redhat:storage:2:client:el5", "cpe:/a:redhat:storage:3:client:el6" ]
null
null
null
null
RHSA-2010:0271
Red Hat Security Advisory: kvm security, bug fix and enhancement update
libspice: Insufficient guest provided memory mappings boundaries validations qemu: Improper handling of erroneous data provided by Linux virtio-net driver
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2014:0922
Red Hat Security Advisory: httpd24-httpd security update
httpd: mod_cache NULL pointer dereference crash httpd: mod_proxy denial of service httpd: mod_deflate denial of service httpd: mod_status heap-based buffer overflow httpd: mod_cgid denial of service
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2022:0634
Red Hat Security Advisory: rpm security update
rpm: RPM does not require subkeys to have a valid binding signature
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
4.4
null
null
RHSA-2024:3972
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2013:0588
Red Hat Security Advisory: gnutls security update
gnutls: TLS CBC padding timing attack (lucky-13)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6610
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: buffer overflow in nft_set_desc_concat_parse() kernel: heap overflow in nft_set_elem_init()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2025:1314
Red Hat Security Advisory: doxygen security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.1
null
null
RHSA-2020:1036
Red Hat Security Advisory: texlive security update
texlive: Buffer overflow in t1_check_unusual_charstring function in writet1.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7
null
RHSA-2024:1697
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.3 security update
CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
6.5
null
null
RHSA-2023:4888
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
RHSA-2024:3008
Red Hat Security Advisory: pmix security update
pmix: race condition allows attackers to obtain ownership of arbitrary files
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.1
null
null
RHSA-2013:0682
Red Hat Security Advisory: jakarta-commons-httpclient security update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
3.7
null
RHSA-2021:1072
Red Hat Security Advisory: libldb security update
samba: Out of bounds read in AD DC LDAP server
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.1
null
null
RHSA-2018:2089
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
8.1
null
RHSA-2011:0162
Red Hat Security Advisory: kernel security and bug fix update
kernel: tipc: heap overflow in tipc_msg_build() kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: ipc/shm.c: reading uninitialized stack memory kernel: ipc/compat*.c: reading uninitialized stack memory kernel: drivers/serial/serial_core.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: socket filters infoleak kernel: missing tty ops write function presence check in hci_uart_tty_open() kernel: unix socket local dos
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:5530
Red Hat Security Advisory: Logging Subsystem 5.7.7 - Red Hat OpenShift security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:logging:5.7::el8" ]
null
7.5
null
null
RHSA-2023:4641
Red Hat Security Advisory: rh-dotnet60-dotnet security, bug fix, and enhancement update
dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.5
null
null
RHSA-2011:1418
Red Hat Security Advisory: kernel security update
kernel: panic occurs when clock_gettime() is called
[ "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2016:1089
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 security update
openssl: use-after-free on invalid EC private key import libxml2: CPU exhaustion when processing specially crafted XML input tomcat: directory disclosure tomcat: Session fixation tomcat: CSRF token leak libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey libxml2: Heap-based buffer overflow in xmlParseXmlDecl libxml2: Heap-based buffer overflow in xmlGROW libxml2: Heap buffer overflow in xmlParseMisc libxml2: Out-of-bounds memory access libxml2: heap-based buffer overflow in xmlParseConditionalSections() libxml2: DoS caused by incorrect error detection during XZ decompression libxml2: Buffer overread with XML parser in xmlNextChar libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration libxml2: out-of-bounds memory access when parsing an unclosed HTML comment tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext()
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0" ]
null
null
6.3
null
RHSA-2004:609
Red Hat Security Advisory: freeradius security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::es" ]
null
null
null
null
RHSA-2021:2732
Red Hat Security Advisory: kernel security update
kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
7.8
null
null
RHSA-2003:231
Red Hat Security Advisory: semi security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2013:0663
Red Hat Security Advisory: sssd security and bug fix update
sssd: simple access provider flaw prevents intended ACL use when client to an AD provider
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:3367
Red Hat Security Advisory: OpenShift Container Platform 4.13.2 bug fix and security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.3
null
null
RHSA-2003:235
Red Hat Security Advisory: : Updated KDE packages fix security issue
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2016:2035
Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update
Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization camel-xstream: Java object de-serialization vulnerability leads to RCE Camel: Java object deserialisation in Jetty/Servlet bouncycastle: Invalid curve attack allowing to extract private keys JGroups: Authorization bypass bsh2: remote code execution via deserialization shiro: Security constraint bypass
[ "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
7.3
null
RHSA-2020:4220
Red Hat Security Advisory: OpenShift Container Platform 4.4.27 openshift-jenkins-2-container security update
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
5.4
null
null
RHBA-2022:5876
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.10.26 extras update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHSA-2020:1979
Red Hat Security Advisory: git security update
git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
null
null
RHSA-2020:1379
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2024:5908
Red Hat Security Advisory: bind security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.5
null
null
RHSA-2019:2304
Red Hat Security Advisory: openssl security and bug fix update
openssl: timing side channel attack in the DSA signature algorithm openssl: 0-byte record padding oracle
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
5.1
null
RHSA-2021:3142
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2010:0331
Red Hat Security Advisory: GFS-kernel security and bug fix update
kernel: bug in GFS/GFS2 locking code leads to dos
[ "cpe:/a:redhat:rhel_global_file_system:4" ]
null
null
null
null
RHSA-2023:5030
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
ArgoCD: secrets can be leak through kubectl.kubernetes.io/last-applied-configuration ArgoCD: Denial of Service to Argo CD repo-server
[ "cpe:/a:redhat:openshift_gitops:1.8::el8" ]
null
6.5
null
null
RHSA-2025:0166
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2020:2729
Red Hat Security Advisory: openstack-manila and openstack-manila security update
openstack-manila: User with share-network UUID is able to show, create and delete shares
[ "cpe:/a:redhat:openstack:13::el7" ]
null
8.3
null
null
RHSA-2022:0400
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
6.6
null
null
RHSA-2014:1147
Red Hat Security Advisory: squid security update
squid: assertion failure in Range header processing (SQUID-2014:2)
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:1537
Red Hat Security Advisory: Red Hat OpenStack Platform director security update
rhosp-director: libvirtd is deployed with no authentication
[ "cpe:/a:redhat:openstack-director:7::el7" ]
null
null
9.9
null
RHSA-2021:1881
Red Hat Security Advisory: poppler and evince security, bug fix, and enhancement update
poppler: pdftohtml: access to uninitialized pointer could lead to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2023:5976
Red Hat Security Advisory: Service Telemetry Framework 1.5.2 security update
golang: crypto/tls: large handshake records may cause panics golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:service_telemetry_framework:1.5::el8" ]
null
7.5
null
null
RHSA-2023:6105
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP1 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
7.5
null
null
RHSA-2003:180
Red Hat Security Advisory: sharutils security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2014:0581
Red Hat Security Advisory: python-django-horizon security update
openstack-horizon: XSS in Horizon orchestration dashboard when using a malicious template
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2022:4796
Red Hat Security Advisory: nodejs:16 security update
npm: npm ci succeeds when package-lock.json doesn't match package.json
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2020:5528
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 8
keycloak: Account REST API can update user metadata attributes
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
4.2
null
null
RHSA-2008:1047
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Linux-specific code execution flaw via crafted SWF file
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:0155
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update
keycloak-server-spi-private: ECP SAML binding bypasses authentication flows Keycloak: Incorrect authorization allows unpriviledged users to create other users resteasy: Error message exposes endpoint class information xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
7.5
null
null
RHBA-2015:0038
Red Hat Bug Fix Advisory: Red Hat Storage 3.0 enhancement and bug fix update #3
glusterfs: fragment header infinite loop DoS
[ "cpe:/a:redhat:storage:2:client:el5", "cpe:/a:redhat:storage:3:client:el6", "cpe:/a:redhat:storage:3:nagios:el6", "cpe:/a:redhat:storage:3:server:el6" ]
null
null
null
null
RHSA-2014:1008
Red Hat Security Advisory: samba security and bug fix update
samba: remote code execution in nmbd
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:5810
Red Hat Security Advisory: OpenShift Container Platform 4.12.64 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm jinja2: accepts keys containing non-attribute characters python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9", "cpe:/a:redhat:openshift_ironic:4.12::el9" ]
null
7.5
null
null
RHSA-2023:6595
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi amd: Return Address Predictor vulnerability leading to information disclosure
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.6
null
null
RHSA-2022:8492
Red Hat Security Advisory: python39:3.9 security update
python: local privilege escalation via the multiprocessing forkserver start method
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.8
null
null
RHSA-2024:10750
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2021:3676
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
8.8
null
null
RHSA-2024:10535
Red Hat Security Advisory: OpenShift Container Platform 4.12.70 security update
waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9", "cpe:/a:redhat:openshift_ironic:4.12::el9" ]
null
7.5
null
null
RHSA-2024:6203
Red Hat Security Advisory: emacs security update
emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.8
null
null
RHSA-2022:1462
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 7
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el7" ]
null
5.9
null
null
RHSA-2007:0069
Red Hat Security Advisory: openoffice.org security update
security flaw security flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2022:1139
Red Hat Security Advisory: httpd security update
httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
8.3
null
null
RHSA-2012:0309
Red Hat Security Advisory: sudo security and bug fix update
sudo: does not ask for password on GID changes
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:0002
Red Hat Security Advisory: RHN Proxy Server 4 - End Of Life
This is the End Of Life notification for RHN Proxy Server 4.
[ "cpe:/a:redhat:network_proxy:4.2::el3", "cpe:/a:redhat:network_proxy:4.2::el4" ]
null
null
null
null
RHSA-2007:0747
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: out of bounds read
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:1764
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2018:2526
Red Hat Security Advisory: mutt security update
mutt: Remote code injection vulnerability to an IMAP mailbox mutt: Remote Code Execution via backquote characters mutt: POP body caching path traversal vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2020:1981
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in storage chromium-browser: Use after free in task scheduling
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2022:4909
Red Hat Security Advisory: OpenShift Container Platform 4.7.52 paackages and security update
credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.3
null
null
RHSA-2017:0341
Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support One-Month Notice
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1.
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2011:0181
Red Hat Security Advisory: openoffice.org and openoffice.org2 security update
OpenOffice.org: directory traversal flaws in handling of XSLT jar filter descriptions and OXT extension files OpenOffice.org: Array index error by insecure parsing of broken rtf tables OpenOffice.org: Integer signedness error (crash) by processing certain RTF tags OpenOffice.org: Heap-based buffer overflow by processing *.doc files with WW8 list styles with specially-crafted count of list levels OpenOffice.org: Array index error by scanning document typography information of certain *.doc files OpenOffice.org: heap based buffer overflow when parsing TGA files
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:2654
Red Hat Security Advisory: OpenShift Container Platform 3.6 security and bug fix update
atomic-openshift: oc patch with json causes masterapi service crash
[ "cpe:/a:redhat:openshift:3.6::el7" ]
null
null
7.7
null
RHSA-2023:6976
Red Hat Security Advisory: libfastjson security update
libfastjson: integer overflow and out-of-bounds write via a large JSON file
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2005:766
Red Hat Security Advisory: squid security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:4690
Red Hat Security Advisory: qt5-qtbase and qt5-qtwebsockets security and bug fix update
qt: XML entity expansion vulnerability qt5-qtwebsockets: websocket implementation allows only limited size for frames and messages therefore attacker can cause DOS qt: files placed by attacker can influence the working directory and lead to malicious code execution qt: files placed by attacker can influence the working directory and lead to malicious code execution qt5: incorrectly calls SSL_shutdown() in OpenSSL mid-handshake causing denial of service in TLS applications
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHEA-2015:2126
Red Hat Enhancement Advisory: elfutils bug fix and enhancement update
elfutils: directory traversal in read_long_names()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2021:3151
Red Hat Security Advisory: sssd security update
sssd: shell command injection in sssctl
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.7
null
null
RHSA-2014:1635
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:31.2) (MFSA 2014-74) Mozilla: Buffer overflow during CSS manipulation (MFSA 2014-75) Mozilla: Web Audio memory corruption issues with custom waveforms (MFSA 2014-76) Mozilla: Out-of-bounds write with WebM video (MFSA 2014-77) Mozilla: Use-after-free interacting with text directionality (MFSA 2014-79) Mozilla: Accessing cross-origin objects via the Alarms API (MFSA 2014-82)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:3500
Red Hat Security Advisory: ruby:3.0 security update
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.6
null
null
RHSA-2014:0512
Red Hat Security Advisory: kernel security update
kernel: pty layer race condition leading to memory corruption
[ "cpe:/o:redhat:rhel_eus:6.3::computenode", "cpe:/o:redhat:rhel_eus:6.3::server" ]
null
null
null
null
RHSA-2021:2659
Red Hat Security Advisory: linuxptp security update
linuxptp: missing length check of forwarded messages
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null