id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:6169
Red Hat Security Advisory: thunderbird security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2020:1912
Red Hat Security Advisory: bluez security update
bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
4.5
null
RHSA-2023:1588
Red Hat Security Advisory: kernel security update
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2019:0809
Red Hat Security Advisory: ovmf security update
edk2: Buffer Overflow in BlockIo service for RAM disk
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
8.3
null
RHSA-2022:5717
Red Hat Security Advisory: grafana security update
grafana: OAuth account takeover
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.1
null
null
RHSA-2024:11570
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.5 Security update
undertow: information leakage via HTTP/2 request header reuse hornetq-core-client: Arbitrarily overwrite files or access sensitive information
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
7.1
null
null
RHSA-2014:1037
Red Hat Security Advisory: cfme security and bug fix update
CFME: AgentController get/log application log forging
[ "cpe:/a:redhat:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2023:3556
Red Hat Security Advisory: python3 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2004:041
Red Hat Security Advisory: slocate security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:3672
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
6.5
null
RHSA-2019:3842
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
6.5
null
RHSA-2020:0631
Red Hat Security Advisory: ppp security update
ppp: Buffer overflow in the eap_request and eap_response functions in eap.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
9.8
null
null
RHSA-2012:1255
Red Hat Security Advisory: libexif security update
libexif: "exif_entry_get_value()" heap-based out-of-bounds array read libexif: "exif_convert_utf16_to_utf8()" heap-based out-of-bounds array read libexif: "exif_entry_format_value()" buffer overflow libexif: "exif_data_load_data()" heap-based out-of-bounds array read libexif: "mnote_olympus_entry_get_value()" division by zero libexif: "exif_convert_utf16_to_utf8()" off-by-one libexif: "exif_entry_get_value()" integer underflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:3223
Red Hat Security Advisory: grub2 security update
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
5.7
null
null
RHSA-2019:1529
Red Hat Security Advisory: pki-deps:10.6 security update
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.3
null
RHSA-2014:0889
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Restrict use of privileged annotations (Libraries, 8034985) OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) OpenJDK: Incorrect handling of invocations with exhausted ranks (Libraries, 8035793) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:4799
Red Hat Security Advisory: rsyslog security update
rsyslog: Heap-based overflow in TCP syslog server
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2008:0566
Red Hat Security Advisory: rhpki-util, rhpki-common, and rhpki-ca security and bug fix update
rhcs CRL can get corrupted
[ "cpe:/a:redhat:certificate_system:7.3" ]
null
null
null
null
RHSA-2019:0525
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: use-after-free in jbd2_journal_commit_transaction funtion kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.8
null
RHSA-2025:0316
Red Hat Security Advisory: raptor2 security update
raptor: integer underflow when normalizing a URI with the turtle parser
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb" ]
null
7.3
null
null
RHSA-2023:1364
Red Hat Security Advisory: firefox security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2012:1267
Red Hat Security Advisory: bind security and bug fix update
bind: specially crafted resource record causes named to exit
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:10800
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2020:1420
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHBA-2018:1219
Red Hat Bug Fix Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.11
ovirt-engine: API exposes power management credentials to administrators
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
7.7
null
RHSA-2021:3585
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.3
null
null
RHSA-2014:1161
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.4.2 update
Engine: XML eXternal Entity (XXE) flaw in backend module
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2005:331
Red Hat Security Advisory: XFree86 security update
libxpm buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:0981
Red Hat Security Advisory: unbound security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
RHSA-2020:4317
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2022:7885
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
RHSA-2024:4070
Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:certificate_system_eus:10.4::el8" ]
null
7.5
null
null
RHSA-2024:0410
Red Hat Security Advisory: tcpdump security update
tcpslice: use-after-free in extract_slice()
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
5.5
null
null
RHSA-2018:1820
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
4.8
null
RHSA-2020:2333
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 19 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods cxf: OpenId Connect token service does not properly validate the clientId cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
[ "cpe:/a:redhat:jboss_enterprise_application_platform_cd:19" ]
null
8.1
7.5
null
RHSA-2016:2809
Red Hat Security Advisory: ipsilon security update
ipsilon: DoS via logging out all open SAML2 sessions
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
8.2
null
RHSA-2022:2191
Red Hat Security Advisory: gzip security update
gzip: arbitrary-file-write vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2024:3475
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.5 security update
argocd: Use of Risky or Missing Cryptographic Algorithms in Redis Cache
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
9.6
null
null
RHSA-2018:1060
Red Hat Security Advisory: pcs security update
pcs: Privilege escalation via authorized user malicious REST call pcs: Debug parameter removal bypass, allowing information disclosure rack-protection: Timing attack in authenticity_token.rb
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
3.7
null
RHBA-2015:1100
Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update
rubygem-actionmailer: email address processing DoS rubygem-i18n: cross-site scripting flaw in exception handling rubygem-sprockets: arbitrary file existence disclosure rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses rubygem-rest-client: unsanitized application logging
[ "cpe:/a:redhat:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2021:1189
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.4
null
null
RHSA-2008:0110
Red Hat Security Advisory: openldap security update
openldap: slapd crash on NOOP control operation on entry in bdb storage openldap: slapd crash on modrdn operation with NOOP control on entry in bdb storage
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:1803
Red Hat Security Advisory: mod_auth_mellon security update
mod_auth_mellon: remote memory disclosure flaw mod_auth_mellon: logout processing leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:2586
Red Hat Security Advisory: container-tools:3.0 security update
golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: regexp/syntax: limit memory used by parsing regexps
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
6.5
null
null
RHSA-2022:0344
Red Hat Security Advisory: kernel security update
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
5.5
null
null
RHSA-2023:4541
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: OOB access in the Linux kernel's XFS subsystem kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2013:1843
Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 security update
GateIn: XSS due to improper url escaping
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0" ]
null
null
null
null
RHSA-2022:4888
Red Hat Security Advisory: thunderbird security update
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
6.1
null
RHSA-2017:1095
Red Hat Security Advisory: bind security update
bind: Incorrect error handling causes assertion failure when using DNS64 with "break-dnssec yes;" bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2015:1507
Red Hat Security Advisory: qemu-kvm security and bug fix update
qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function qemu: ide: atapi: heap overflow during I/O buffer memory access
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2008:0267
Red Hat Security Advisory: java-1.6.0-ibm security update
Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Untrusted Java Web Start arbitrary file creation Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2017:0259
Red Hat Security Advisory: nagios security update
nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
[ "cpe:/a:redhat:storage:3.1:nagios:el6", "cpe:/a:redhat:storage:3.1:server:el6" ]
null
null
7.3
null
RHSA-2007:1165
Red Hat Security Advisory: libexif security update
libexif infinite recursion flaw (DoS) libexif integer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4392
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update
jose4j: denial of service via specially crafted JWE undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
7.5
null
null
RHSA-2024:0190
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update
GitPython: Blind local file inclusion
[ "cpe:/a:redhat:openstack:17.1::el8" ]
null
5.1
null
null
RHSA-2005:346
Red Hat Security Advisory: slocate security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:1458
Red Hat Security Advisory: OpenShift Container Platform 4.14.18 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2023:6810
Red Hat Security Advisory: squid:4 security update
squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.6
null
null
RHSA-2024:0407
Red Hat Security Advisory: git security update
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree git: Bypass of safe.directory protections git: exposure of sensitive information to a malicious actor git: git shell function that splits command arguments can lead to arbitrary heap writes. git: data exfiltration with maliciously crafted repository git: git apply: a path outside the working tree can be overwritten with crafted input
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2023:5771
Red Hat Security Advisory: bind9.16 security update
bind: stack exhaustion in control channel code may lead to DoS
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2022:6507
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes
moment: inefficient parsing algorithm resulting in DoS vm2: Sandbox Escape in vm2
[ "cpe:/a:redhat:acm:2.5::el8" ]
null
10
null
null
RHSA-2025:3828
Red Hat Security Advisory: glibc security update
glibc: buffer overflow in the GNU C Library's assert()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2005:011
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2013:1674
Red Hat Security Advisory: dracut security, bug fix, and enhancement update
dracut: Creates initramfs images with world-readable permissions (information disclosure)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:8722
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2013:1427
Red Hat Security Advisory: ruby193-ruby security update
rubygems: version regex algorithmic complexity vulnerability
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2007:0346
Red Hat Security Advisory: vim security update
vim-7 modeline security issue
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:4914
Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update
nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs: Prototype pollution via console.table properties
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.2
null
null
RHSA-2024:10289
Red Hat Security Advisory: container-tools:rhel8 security update
podman: podman machine spawns gvproxy with port bound to all IPs golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2017:0828
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 7
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack jboss: jbossas writable config files allow privilege escalation tomcat: Infinite loop in the processing of https requests
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
7.5
null
RHSA-2017:3335
Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 AMC One-Month Notice
This is the one-month notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2.
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2013:0581
Red Hat Security Advisory: libxml2 security update
libxml2: CPU consumption DoS when performing string substitutions during entities expansion
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2005:112
Red Hat Security Advisory: emacs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2016:0595
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2021:2306
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
5.6
null
null
RHSA-2020:2441
Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift-enterprise-hyperkube-container security update
kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
[ "cpe:/a:redhat:openshift:4.3::el7" ]
null
6.3
null
null
RHSA-2020:0027
Red Hat Security Advisory: kpatch-patch security update
Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7.4
null
RHSA-2016:0098
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2024:0601
Red Hat Security Advisory: thunderbird security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2016:1856
Red Hat Security Advisory: rh-ror41-rubygem-actionview security update
rubygem-actionview: cross-site scripting flaw in Action View
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
6.1
null
RHSA-2003:273
Red Hat Security Advisory: : Updated pine packages fix vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2022:7187
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2005:747
Red Hat Security Advisory: slocate security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2015:2552
Red Hat Security Advisory: kernel security and bug fix update
virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2009:0270
Red Hat Security Advisory: gstreamer-plugins security update
gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Time-to-sample (stss) atom data
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2003:156
Red Hat Security Advisory: : : : Updated gaim client fixes vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2024:5255
Red Hat Security Advisory: kernel security update
kernel: vt: fix memory overlapping when deleting chars in the buffer amd: Return Address Predictor vulnerability leading to information disclosure kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: tcp: add sanity checks to rx zerocopy kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: arp: Prevent overflow in arp_req_get(). kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: Squashfs: check the inode number is not the invalid value of zero kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: tcp: properly terminate timers for kernel sockets kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: i40e: fix vf may be used uninitialized in this function warning kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: net: bridge: xmit: make sure we have at least eth header len bytes kernel: net/mlx5: Discard command completions in internal error
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4.4
null
null
RHSA-2016:0490
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 OpenSSL security update
openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
null
null
RHSA-2021:4686
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Use-after-free leading to arbitrary code execution
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2015:0251
Red Hat Security Advisory: samba security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2005:435
Red Hat Security Advisory: mozilla security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHEA-2013:1032
Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory
stapler-adjunct-zeroclipboard: XSS via copying XSS payload into buffer Jenkins: Build Description XSS Jenkins: Multiple CSRF in MavenAbstractArtifactRecord.doRedeploy and Jenkins.doEval
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2023:4382
Red Hat Security Advisory: openssh security update
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2024:3062
Red Hat Security Advisory: python3.11 security update
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2024:0800
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 9
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
6.5
null
null
RHSA-2024:0025
Red Hat Security Advisory: firefox security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.1
null
null
RHSA-2023:6469
Red Hat Security Advisory: wireshark security update
wireshark: RTPS dissector crash wireshark: IEEE C37.118 Synchrophasor dissector crash wireshark: Candump log file parser crash wireshark: VMS TCPIPtrace file parser crash wireshark: NetScaler file parser crash wireshark: XRA dissector infinite loop
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2025:0224
Red Hat Security Advisory: Red Hat build of Cryostat security update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:cryostat:3::el8" ]
null
7.5
null
null
RHSA-2022:0722
Red Hat Security Advisory: rh-maven36-httpcomponents-client security update
apache-httpclient: incorrect handling of malformed authority component in request URIs
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.3
null
null
RHSA-2022:0816
Red Hat Security Advisory: firefox security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
7.5
null