id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:7244
|
Red Hat Security Advisory: linux-firmware security update
|
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 6.5 | null | null |
RHSA-2003:316
|
Red Hat Security Advisory: : Updated iproute packages fix local security vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:4592
|
Red Hat Security Advisory: rsync security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.2 | null | null |
RHSA-2022:7704
|
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
|
webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Cookie management issue leading to sensitive user information disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: malicious content may lead to UI spoofing webkitgtk: UI spoofing while Visiting a website that frames malicious content
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null |
RHSA-2019:0809
|
Red Hat Security Advisory: ovmf security update
|
edk2: Buffer Overflow in BlockIo service for RAM disk
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8.3 | null |
RHSA-2022:0350
|
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
|
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2022:0712
|
Red Hat Security Advisory: kernel security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7 | null | null |
RHSA-2024:0228
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.4 | null | null |
RHSA-2020:1341
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:6765
|
Red Hat Security Advisory: bind security update
|
bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2014:0383
|
Red Hat Security Advisory: samba4 security update
|
samba: pam_winbind fails open when non-existent group specified to require_membership_of samba: Password lockout not enforced for SAMR password changes samba: smbcacls will delete ACL lists in certain circumstances
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3341
|
Red Hat Security Advisory: thunderbird security update
|
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2024:1082
|
Red Hat Security Advisory: gnutls security update
|
gnutls: incomplete fix for CVE-2023-5981 gnutls: rejects certificate chain with distributed trust
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHBA-2022:0052
|
Red Hat Bug Fix Advisory: openvswitch2.15 update
|
openvswitch: External triggered memory leak in Open vSwitch while processing fragmented packets
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2024:0097
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 for OpenShift image enhancement and security update
|
keycloak: open redirect via "form_post.jwt" JARM response mode
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 4.6 | null | null |
RHSA-2022:6439
|
Red Hat Security Advisory: booth security update
|
booth: authfile directive in booth config file is completely ignored.
|
[
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 6.5 | null | null |
RHSA-2024:0308
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.57 packages and security update
|
haproxy: Proxy forwards malformed empty Content-Length headers
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:7887
|
Red Hat Security Advisory: linux-firmware security update
|
hardware: buffer overflow in bluetooth firmware
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 8.8 | null | null |
RHSA-2017:2016
|
Red Hat Security Advisory: curl security, bug fix, and enhancement update
|
curl: escape and unescape integer overflows
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.9 | null |
RHSA-2021:0184
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: information exposure in drivers/char/random.c and kernel/time/timer.c kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 6.7 | null | null |
RHSA-2024:8680
|
Red Hat Security Advisory: mod_http2 security update
|
mod_http2: DoS by null pointer in websocket over HTTP/2
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.7 | null | null |
RHSA-2010:0888
|
Red Hat Security Advisory: openssl security update
|
OpenSSL TLS extension parsing race condition
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2986
|
Red Hat Security Advisory: python3.11-urllib3 security update
|
python-urllib3: Cookie request header isn't stripped during cross-origin redirects
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2012:0478
|
Red Hat Security Advisory: samba security update
|
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2004:120
|
Red Hat Security Advisory: openssl security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:6103
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update
|
golang: crypto/tls: session tickets lack random ticket_age_add golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2012:1577
|
Red Hat Security Advisory: java-1.4.2-ibm-sap End of Support Notice
|
The java-1.4.2-ibm-sap packages shipped in the Red Hat Enterprise Linux 5
and 6 for SAP RHN repositories are no longer supported for SAP products. As
a result, these packages will no longer be updated and may contain security
flaws. Users are advised to migrate to the supported version of SAP
certified Java.
|
[
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2009:1075
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_ssl per-connection memory leak for connections with zlib compression httpd: AllowOverride Options=IncludesNoExec allows Options Includes
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:0189
|
Red Hat Security Advisory: Red Hat AMQ Streams 2.3.0 release and security update
|
jetty-http: improver hostname input handling http2-server: Invalid HTTP/2 requests cause DoS jetty-server: Improper release of ByteBuffers in SslConnections snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
|
[
"cpe:/a:redhat:amq_streams:2"
] | null | 7.5 | null | null |
RHSA-2020:3726
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: Push diary crash on specifically crafted HTTP/2 header
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4548
|
Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 security update
|
kernel: TIPC message reassembly use-after-free remote code execution vulnerability
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2022:1442
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2024:1394
|
Red Hat Security Advisory: ovn23.03 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2024:1391
|
Red Hat Security Advisory: ovn23.06 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2013:0267
|
Red Hat Security Advisory: tomcat7 security update
|
Tomcat/JBoss Web - Bypass of CSRF prevention filter
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.0"
] | null | null | null | null |
RHSA-2021:2724
|
Red Hat Security Advisory: systemd security update
|
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2012:1508
|
Red Hat Security Advisory: rhev-3.1.0 vdsm security, bug fix, and enhancement update
|
rhev: vds_installer insecure /tmp use rhev: vds_installer is prone to MITM when downloading 2nd stage installer
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2023:4814
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: kernel info leak issue in pfkey_register kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHSA-2016:1204
|
Red Hat Security Advisory: spice-server security update
|
spice: heap-based memory corruption within smartcard handling spice: Host memory access from guest with invalid primary surface parameters
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:1419
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: improve sequence number generation kernel: panic occurs when clock_gettime() is called
|
[
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2015:0920
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.2 update
|
Management: Limited RBAC authorization bypass Subsystem: Information disclosure via incorrect sensitivity classification of attribute Weld: Limited information disclosure via stale thread state
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null |
RHSA-2003:273
|
Red Hat Security Advisory: : Updated pine packages fix vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2018:2006
|
Red Hat Security Advisory: libvirt security and bug fix update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.6 | null |
RHSA-2004:137
|
Red Hat Security Advisory: : Updated Ethereal packages fix security issues
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2008:0892
|
Red Hat Security Advisory: xen security and bug fix update
|
qemu/kvm/xen: add image format options for USB storage and removable media qemu/xen/kvm: ioemu: Fix PVFB backend to limit frame buffer size
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2644
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
|
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade expat: heap-based buffer over-read via crafted XML input libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c httpd: mod_proxy_ftp use of uninitialized value libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:jboss_core_services:1::el6",
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | 7.5 | 7.5 | null |
RHSA-2020:2838
|
Red Hat Security Advisory: file security update
|
file: out-of-bounds read via a crafted ELF file
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 5.4 | null |
RHSA-2023:1101
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2023:3425
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: remote code execution in cups-filters, beh CUPS backend
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2022:4896
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates gzip: arbitrary-file-write vulnerability rsyslog: Heap-based overflow in TCP syslog server kernel: heap out of bounds write in nf_dup_netdev.c
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2010:0002
|
Red Hat Security Advisory: PyXML security update
|
expat: buffer over-read and crash on XML with malformed UTF-8 sequences
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0593
|
Red Hat Security Advisory: systemd security update
|
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 4.3 | null |
RHSA-2009:0003
|
Red Hat Security Advisory: xen security and bug fix update
|
xen: Multiple unsafe uses of guest-writable data from xenstore xen: insecure temporary file use in qemu-dm.debug
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0095
|
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
|
kernel: ipv6_hop_jumbo remote system crash kernel: emergency route cache flushing leads to node deadlock kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue kvm: emulator privilege escalation kvm: emulator privilege escalation IOPL/CPL level check kvm: cat /dev/port in guest cause the host hang
|
[
"cpe:/o:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2020:2059
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.8 on RHEL 7 security update
|
jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId cxf: reflected XSS in the services listing page Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass cryptacular: excessive memory allocation during a decode operation undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | 6.5 | 8.1 | null |
RHSA-2016:0101
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: underflow read in png_check_keyword() OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2015:1053
|
Red Hat Security Advisory: php55 security and bug fix update
|
php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: NULL pointer dereference in pgsql extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2023:6371
|
Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update
|
cloud-init: sensitive data could be exposed in logs
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2014:0702
|
Red Hat Security Advisory: mariadb security update
|
mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.9 | null |
RHSA-2016:0050
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1669
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
Qemu: information leakage when guest sets high resolution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:1350
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: error in exception handling leads to DoS
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 6.5 | null |
RHSA-2005:337
|
Red Hat Security Advisory: thunderbird security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0565
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Message ID calculation was based on uninitialized data Mozilla: Out-of-bounds read when processing certain email messages Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords Mozilla: Crash processing S/MIME messages with multiple signatures Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2020:3308
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.2 security update
|
tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.3"
] | null | 7.5 | null | null |
RHSA-2024:4618
|
Red Hat Security Advisory: libndp security update
|
libndp: buffer overflow in route information length field
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 8.1 | null | null |
RHSA-2017:0003
|
Red Hat Security Advisory: systemd security update
|
systemd: freeze when PID 1 receives a zero-length message over notify socket
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | 6.8 | null |
RHSA-2024:9627
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.3
|
http-proxy-middleware: Denial of Service
|
[
"cpe:/a:redhat:service_mesh:2.6::el8",
"cpe:/a:redhat:service_mesh:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2024:9990
|
Red Hat Security Advisory: RHOSP 17.1.4 (openstack-tripleo-common and python-tripleoclient) security update
|
openstack-tripleo-common: RHOSP Director Disables TLS Verification for Registry Mirrors
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 8.1 | null | null |
RHSA-2015:1254
|
Red Hat Security Advisory: curl security, bug fix, and enhancement update
|
curl: incorrect handling of IP addresses in cookie domain curl: incorrect handle duplication after COPYPOSTFIELDS curl: URL request injection vulnerability in parseurlandfillconn() curl: re-using authenticated connection when unauthenticated curl: Negotiate not treated as connection-oriented
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5099
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:6848
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.4 | null | null |
RHSA-2015:0857
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
jar: directory traversal vulnerability JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2021:4256
|
Red Hat Security Advisory: graphviz security update
|
graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2001:072
|
Red Hat Security Advisory: : Updated man package fixing GID security problems.
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:5.2",
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2019:2425
|
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
|
QEMU: seccomp: blacklist is not applied to all threads QEMU: rtl8139: integer overflow leads to buffer overflow QEMU: net: ignore packets with large size QEMU: scsi-generic: possible OOB access while handling inquiry request QEMU: slirp: heap buffer overflow in tcp_emu() QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables
|
[
"cpe:/a:redhat:openstack:10::el7",
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 2.8 | null |
RHSA-2023:7261
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.4 | null | null |
RHSA-2023:7599
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.5 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2017:1308
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Use after free in seq file kernel: Oops in shash_async_export() kernel: EXT4 memory corruption / SLAB out-of-bounds read kernel: Reachable BUG_ON from userspace in sctp_wait_for_sndbuf kernel: net/packet: overflow in check for priv area size
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2007:0252
|
Red Hat Security Advisory: sendmail security and bug fix update
|
sendmail allows external mail with from address xxx@localhost.localdomain
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:6355
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: local root privilege escalation in the virtual machine
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7 | null | null |
RHSA-2024:10832
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:1765
|
Red Hat Security Advisory: openvswitch2.17 security update
|
openvswitch: ip proto 0 triggers incorrect handling
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.2 | null | null |
RHSA-2023:3269
|
Red Hat Security Advisory: devtoolset-12-binutils security update
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.5 | null | null |
RHSA-2023:7254
|
Red Hat Security Advisory: dotnet8.0 security update
|
dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2023:5526
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2014:0016
|
Red Hat Security Advisory: gnupg security update
|
gnupg: RSA secret key recovery via acoustic cryptanalysis
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2048
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.7 security update on RHEL 8
|
velocity: arbitrary code execution when attacker is able to modify templates netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 5.9 | null | null |
RHSA-2022:1420
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.685 security and bug fix update
|
xstream: Injecting highly recursive collections or maps can cause a DoS workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.5 | null | null |
RHSA-2025:1070
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-django20) security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 6.1 | null | null |
RHSA-2014:0322
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: snmpd crashes/hangs when AgentX subagent times-out net-snmp: snmptrapd crash when using a trap with empty community string
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:156
|
Red Hat Security Advisory: : : : Updated gaim client fixes vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:3105
|
Red Hat Security Advisory: python3.11-cryptography security update
|
python-cryptography: NULL-dereference when loading PKCS7 certificates
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:9545
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 5.4 | null | null |
RHSA-2025:1861
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.4 (openstack-ansible-core) security update
|
ansible-core: Ansible-core user may read/write unauthorized content jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 6.3 | null | null |
RHSA-2024:0059
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.56 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2021:2121
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.13 bug fix and security update
|
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2024:0207
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.9 packages and security update
|
cri-o: Pods are able to break out of resource confinement on cgroupv2 opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2007:0737
|
Red Hat Security Advisory: pam security, bug fix, and enhancement update
|
security flaw audit logging of failed logins
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:4103
|
Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update
|
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: crypto/elliptic: incorrect operations on the P-224 curve golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
|
[
"cpe:/a:redhat:container_native_virtualization:4.9::el7",
"cpe:/a:redhat:container_native_virtualization:4.9::el8"
] | null | 5.9 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.