id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:1172
|
Red Hat Security Advisory: procmail security update
|
procmail: Heap-overflow in procmail's formail utility when processing specially-crafted email headers
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2793
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.11 atomic-openshift-descheduler-container security update
|
golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.3 | null | null |
RHSA-2015:2559
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update
|
batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_brms:6.2"
] | null | null | null | null |
RHSA-2004:543
|
Red Hat Security Advisory: cups security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2001:077
|
Red Hat Security Advisory: : LPRng fails to drop supplemental group membership
|
security flaw
|
[
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:9452
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.4 | null | null |
RHSA-2020:2296
|
Red Hat Security Advisory: openvswitch2.11 security, bug fix and enhancement update
|
dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 5.1 | null | null |
RHSA-2020:5439
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5 | null | null |
RHSA-2018:3540
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.8 | null |
RHSA-2023:5174
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update
|
envoy: gRPC access log crash caused by the listener draining
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 6.5 | null | null |
RHSA-2013:1144
|
Red Hat Security Advisory: nss, nss-util, nss-softokn, and nspr security update
|
Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0442
|
Red Hat Security Advisory: sssd security update
|
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.8 | null | null |
RHSA-2015:0809
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect handling of default methods (Hotspot, 8065366) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:1291
|
Red Hat Security Advisory: kernel security update
|
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.3 | null | null |
RHSA-2011:0281
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
OpenJDK DNS cache poisoning by untrusted applets (6981922) OpenJDK Launcher incorrect processing of empty library path entries (6983554) OpenJDK Swing timer-based security manager bypass (6907662) OpenJDK Hotspot verifier heap corruption (6878713) OpenJDK JAXP untrusted component state manipulation (6927050) OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1931
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-yaql and openstack-tripleo-heat-templates) security update
|
YAQL: OpenStack Murano Component Information Leakage
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 8.4 | null | null |
RHSA-2021:0166
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2022:5779
|
Red Hat Security Advisory: ruby:2.5 security update
|
ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:5813
|
Red Hat Security Advisory: bind and bind-dyndb-ldap security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHBA-2020:0017
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
|
jenkins: Stored XSS vulnerability in expandable textbox form control jenkins: XSS vulnerability in combobox form control jenkins: Stored XSS vulnerability in SCM tag action tooltip jenkins: Stored XSS vulnerability in queue item tooltip jenkins: Diagnostic web page exposed Cookie HTTP header jenkins: XSS vulnerability in Jenkins URL setting
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 4.8 | null |
RHSA-2018:2309
|
Red Hat Security Advisory: kernel security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2024:0609
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2017:1983
|
Red Hat Security Advisory: postgresql security and enhancement update
|
postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: pg_user_mappings view discloses foreign server passwords
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.3 | null |
RHSA-2024:10666
|
Red Hat Security Advisory: gimp:2.8.22 security update
|
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.8 | null | null |
RHSA-2014:0284
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: block: passing disk names as format strings Kernel: net: IPv6: panic when UFO=On for an interface Kernel: net: memory corruption with UDP_CORK and UFO kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached kvm: division by zero in apic_get_tmcct() kvm: cross page vapic_addr access Kernel: qeth: buffer overflow in snmp ioctl
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
RHSA-2020:4247
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update
|
cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null |
RHSA-2008:0907
|
Red Hat Security Advisory: pam_krb5 security update
|
pam_krb5 existing_ticket permission flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:2958
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:4108
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHSA-2023:2378
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2014:0423
|
Red Hat Security Advisory: openshift-origin-broker security update
|
OpenShift: openshift-origin-broker plugin allows impersonation
|
[
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHEA-2020:2262
|
Red Hat Enhancement Advisory: rh-varnish6 bug fix and enhancement update
|
varnish: denial of service handling certain crafted HTTP/1 requests
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2021:0694
|
Red Hat Security Advisory: bind security update
|
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.1 | null | null |
RHSA-2023:0456
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:5002
|
Red Hat Security Advisory: curl security update
|
curl: Incorrect argument check can allow remote servers to overwrite local files
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.4 | null | null |
RHSA-2023:5707
|
Red Hat Security Advisory: dotnet6.0 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2018:2882
|
Red Hat Security Advisory: rh-haproxy18-haproxy security update
|
haproxy: Out-of-bounds read in HPACK decoder
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2024:0253
|
Red Hat Security Advisory: sqlite security update
|
sqlite: heap-buffer-overflow at sessionfuzz
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null |
RHSA-2016:1389
|
Red Hat Security Advisory: Red Hat JBoss Fuse Service Works security update
|
JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | 9.8 | null |
RHSA-2013:0121
|
Red Hat Security Advisory: mysql security and bug fix update
|
mysql: regression of CVE-2009-4030
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2012:1590
|
Red Hat Security Advisory: libtiff security update
|
(tiff2pdf): Heap-based buffer overflow due to improper initialization of T2P context struct pointer libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file libtiff: Stack-based buffer overflow when reading a tiled tiff file
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2003:167
|
Red Hat Security Advisory: lv security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:1512
|
Red Hat Security Advisory: postgresql security update
|
postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2023:0833
|
Red Hat Security Advisory: python3 security update
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure python: CPU denial of service via inefficient IDNA decoder
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2019:2553
|
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) QEMU: rtl8139: integer overflow leads to buffer overflow QEMU: net: ignore packets with large size QEMU: device_tree: heap buffer overflow while loading device tree blob QEMU: scsi-generic: possible OOB access while handling inquiry request QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2023:1806
|
Red Hat Security Advisory: thunderbird security update
|
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:5394
|
Red Hat Security Advisory: libexif security update
|
libexif: out of bounds write due to an integer overflow in exif-entry.c
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 9.8 | null | null |
RHSA-2024:9456
|
Red Hat Security Advisory: osbuild-composer security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2017:1647
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 2.9 | null |
RHSA-2016:0043
|
Red Hat Security Advisory: openssh security update
|
OpenSSH: Client Information leak due to use of roaming connection feature OpenSSH: Client buffer-overflow when using roaming connections
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2012:0429
|
Red Hat Security Advisory: gnutls security update
|
gnutls: buffer overflow in gnutls_session_get_data() (GNUTLS-SA-2011-2) gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0857
|
Red Hat Security Advisory: python-pillow security update
|
pillow: Arbitrary Code Execution via the environment parameter
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2019:3925
|
Red Hat Security Advisory: ansible security update
|
Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs
|
[
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | null | 5.7 | null |
RHSA-2012:0144
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: universal cross-site scripting flaw (APSB12-03)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:1824
|
Red Hat Security Advisory: php security update
|
php: memory corruption in openssl_x509_parse()
|
[
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.2::computenode",
"cpe:/o:redhat:rhel_eus:6.2::server",
"cpe:/o:redhat:rhel_eus:6.3::computenode",
"cpe:/o:redhat:rhel_eus:6.3::server",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2017:2669
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: ext4 filesystem page fault race condition with fallocate call. kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c kernel: Use after free in SCSI generic device interface kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user kernel: Memory leaks in xfs_attr_list.c error paths kernel: netlink: double-free in netlink_dump kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c kernel: ping socket / AF_LLC connect() sin_family race kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) kernel: ipv4: Invalid IP options could cause skb->dst drop kernel: Race condition between multiple sys_perf_event_open() calls kernel: NULL pointer dereference in keyring_search_aux function kernel: scsi: Stack-based buffer overflow in sg_ioctl function kernel: ext4: power failure during write(2) causes on-disk information leak kernel: a race between inotify_handle_event() and sys_rename() kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.5 | null |
RHBA-2015:1465
|
Red Hat Bug Fix Advisory: glibc bug fix update
|
glibc: calloc may return non-zero memory
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4958
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:2785
|
Red Hat Security Advisory: grafana-pcp security update
|
golang: net/http: handle server errors after sending GOAWAY
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:7554
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in nvmet_tcp_free_crypto in NVMe
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2019:1485
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.3 | null |
RHSA-2021:2574
|
Red Hat Security Advisory: rpm security update
|
rpm: unsigned signature header leads to string injection into an rpm database rpm: Signature checks bypass via corrupted rpm package
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2025:3386
|
Red Hat Security Advisory: freetype security update
|
freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 8.1 | null | null |
RHSA-2016:1485
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: various fixes from internal audits chromium-browser: sandbox escape in ppapi chromium-browser: use-after-free in extensions chromium-browser: heap-buffer-overflow in sfntly chromium-browser: same-origin bypass in blink chromium-browser: same-origin bypass in blink chromium-browser: use-after-free in blink chromium-browser: same-origin bypass in v8 chromium-browser: memory corruption in v8 chromium-browser: url spoofing libxml2: Use after free triggered by XPointer paths beginning with range-to chromium-browser: limited same-origin bypass in service workers chromium-browser: origin confusion in proxy authentication chromium-browser: url leakage via pac script chromium-browser: content-security-policy bypass chromium-browser: use after free in extensions chromium-browser: history sniffing with hsts and csp
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2025:3013
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4214
|
Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:devtools:2020"
] | null | 7.5 | null | null |
RHSA-2019:4195
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:4034
|
Red Hat Security Advisory: Red Hat Service Interconnect 1.5.4 Release security update (images)
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
|
[
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 5.9 | null | null |
RHSA-2021:0771
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 3.2 | null | null |
RHSA-2012:0307
|
Red Hat Security Advisory: util-linux security, bug fix, and enhancement update
|
util-linux: mount fails to anticipate RLIMIT_FSIZE util-linux: umount may fail to remove /etc/mtab~ lock file
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1219
|
Red Hat Security Advisory: xml-security security update
|
Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2022:0538
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:0841
|
Red Hat Security Advisory: redhat-access-plugin security update
|
dashboard: log file arbitrary file retrieval
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2023:2784
|
Red Hat Security Advisory: grafana security update
|
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY grafana: using email as a username can block other users from signing in golang: regexp/syntax: limit memory used by parsing regexps
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2021:0658
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2003:195
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:1316
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 5.3 | null | null |
RHSA-2018:3253
|
Red Hat Security Advisory: jasper security update
|
jasper: reachable assertion in JPC_NOMINALGAIN() jasper: NULL pointer exception in jp2_encode()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.5 | null |
RHSA-2021:3366
|
Red Hat Security Advisory: python3 security update
|
python: CRLF injection via HTTP request method in httplib/http.client
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 6.5 | null | null |
RHSA-2015:2504
|
Red Hat Security Advisory: libreport security update
|
libreport: Possible private data leak in Bugzilla bugs opened by ABRT
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1352
|
Red Hat Security Advisory: qemu-kvm-ma security update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.6 | null | null |
RHSA-2024:7822
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2008:0207
|
Red Hat Security Advisory: firefox security update
|
Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1378
|
Red Hat Security Advisory: openstack-ironic security update
|
openstack-ironic: Ironic Node information including credentials exposed to unauthenticated users
|
[
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.9 | null |
RHSA-2020:2926
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.13 openshift-enterprise-hyperkube-container security update
|
kubernetes: node localhost services reachable via martian packets
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.4 | null | null |
RHSA-2020:4137
|
Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.6.6-1 - RHEL7 Container
|
django-rest-framework: XSS Vulnerability in API viewer
|
[
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 5.4 | null | null |
RHSA-2024:4934
|
Red Hat Security Advisory: git-lfs security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2021:4032
|
Red Hat Security Advisory: Openshift Logging 5.2.3 bug fix and security update
|
nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
|
[
"cpe:/a:redhat:logging:5.2::el8"
] | null | 9.8 | null | null |
RHSA-2020:1932
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
buildah: Crafted input tar file may lead to local file overwrite during image build process
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4068
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2015:2514
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2"
] | null | null | null | null |
RHSA-2024:5929
|
Red Hat Security Advisory: postgresql:16 security update
|
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2019:2178
|
Red Hat Security Advisory: udisks2 security, bug fix, and enhancement update
|
udisks: Format string vulnerability in udisks_log in udiskslogging.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2013:1121
|
Red Hat Security Advisory: sos security update
|
sosreport does not blank root password in anaconda plugin
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2038
|
Red Hat Security Advisory: squid:4 security update
|
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.1 | null | null |
RHSA-2019:2805
|
Red Hat Security Advisory: systemd security update
|
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7 | null |
RHSA-2003:064
|
Red Hat Security Advisory: : Updated XFree86 4.1.0 packages are available
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2014:1291
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 update
|
HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature
|
[
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null |
RHSA-2022:1644
|
Red Hat Security Advisory: xmlrpc-c security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 9.8 | null | null |
RHSA-2012:0378
|
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.2.0 update
|
extension): MITM due to improper validation of AX attribute signatures
|
[
"cpe:/a:redhat:jboss_soa_platform:5.2"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.