id stringlengths 13 15 | title stringlengths 29 176 | description stringlengths 8 32.1k | cpes listlengths 0 20 | cvss_v4_0 null | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 null |
|---|---|---|---|---|---|---|---|
RHSA-2020:2440 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift security update | kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 6.3 | null | null |
RHSA-2014:0764 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | Origin: Command execution as root via downloadable cartridge source-url | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2014:0530 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | OpenShift: downloadable cartridge source url file command execution as root | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2024:6044 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.2 bug fixes and container updates | nodejs-semver: Regular expression denial of service | [
"cpe:/a:redhat:acm:2.11::el9"
] | null | 7.5 | null | null |
RHSA-2009:1188 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Remote code execution vulnerability via malicious SWF (Shockwave Flash) content flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) fl... | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2007:0108 | Red Hat Security Advisory: thunderbird security update | security flaw NSS: SSLv2 protocol buffer overflows NSS: SSLv2 protocol buffer overflows security flaw security flaw security flaw security flaw security flaw security flaw : seamonkey cookie setting / same-domain bypass vulnerability security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2015:0980 | Red Hat Security Advisory: pcs security and bug fix update | pcs: improper web session variable signing pcs: improper web session variable signing | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2015:0661 | Red Hat Security Advisory: qpid-cpp security and bug fix update | qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2016:0559 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Advanced Mission Critical (AMC) One-year Notice | This is the One-Year notification for the retirement of Red Hat Enterprise
Linux 5.6 Advanced Mission Critical (AMC). This notification applies only
to those customers subscribed to the Advanced Mission Critical (AMC)
channel for Red Hat Enterprise Linux 5.6. | [
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2012:0406 | Red Hat Security Advisory: JBoss Operations Network 3.0.1 update | tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) CLI: world-writable root directory JON: Unapproved agents can connect using the name of an existing approved agent JON: Unapproved agents can hijack an approved agent's endpoint by using a null security token JON: LDAP authentication allows any user access if... | [
"cpe:/a:redhat:jboss_operations_network:3.0"
] | null | null | null | null |
RHSA-2020:3433 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2014:0578 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | openstack-nova: Nova host data leak to vm instance in rescue mode | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:6496 | Red Hat Security Advisory: haproxy security and bug fix update | haproxy: data leak via fcgi requests | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0451 | Red Hat Security Advisory: xorg-x11 security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0578 | Red Hat Security Advisory: python-pillow security update | python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2015:1981 | Red Hat Security Advisory: nss, nss-util, and nspr security update | nss: use-after-poison in sec_asn1d_parse_leaf() (MFSA 2015-133) nss: ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings (MFSA 2015-133) nspr: heap-buffer overflow in PL_ARENA_ALLOCATE (MFSA 2015-133) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise... | null | null | null | null |
RHSA-2005:034 | Red Hat Security Advisory: xpdf security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:0527 | Red Hat Security Advisory: tomcat6 security update | tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: information disclosure due to incorrect Processor sharing | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2021:3255 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared ... | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 2.8 | 6.5 | null |
RHSA-2022:2283 | Red Hat Security Advisory: OpenShift Container Platform 4.9.35 bug fix and security update | openshift/router: route hijacking attack via crafted HAProxy configuration file | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 6.3 | null | null |
RHSA-2023:7612 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9 release and security update | quarkus: GraphQL operations over WebSockets bypass apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 7.5 | null | null |
RHSA-2023:3243 | Red Hat Security Advisory: git security update | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a ... | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4461 | Red Hat Security Advisory: firefox security update | Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects ... | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2015:0020 | Red Hat Security Advisory: python-keystoneclient security update | python-keystoneclient: TLS certificate verification disabled | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2020:0605 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update | netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 7.5 | null | null |
RHSA-2023:6268 | Red Hat Security Advisory: squid security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication squid: denial of Service in FTP | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2016:2008 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support Six-Month Notice | This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1. | [
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2019:4054 | Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-external-storage security update | kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 4.8 | null |
RHBA-2020:5123 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 7.5 | null | null |
RHSA-2009:1618 | Red Hat Security Advisory: mod_jk security update for Red Hat Network Satellite Server | mod_jk: session information leak | [
"cpe:/a:redhat:network_satellite:5.1::el4",
"cpe:/a:redhat:network_satellite:5.2::el4"
] | null | null | null | null |
RHSA-2008:0364 | Red Hat Security Advisory: mysql security and bug fix update | Mysql log file obfuscation MySQL improper permission revocation mysql improper suid argument evaluation mysql: daemon crash via EXPLAIN on queries on information schema Single MySQL worker can be crashed (NULL deref) with certain SELECT statements mysql: DoS via statement with crafted IF clause mysql DROP privilege not... | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0857 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: out-of-bounds reads in pinctrl subsystem. kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_fil... | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.1 | 6.8 | null |
RHSA-2024:1692 | Red Hat Security Advisory: less security update | less: missing quoting of shell metacharacters in LESSCLOSE handling | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2023:0032 | Red Hat Security Advisory: OpenShift Container Platform 4.10.47 bug fix and security update | crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 9.1 | null | null |
RHSA-2019:2002 | Red Hat Security Advisory: redis:5 security update | redis: Heap buffer overflow in HyperLogLog triggered by malicious client redis: Stack buffer overflow in HyperLogLog triggered by malicious client | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.2 | null |
RHSA-2023:0335 | Red Hat Security Advisory: dbus security update | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2022:1622 | Red Hat Security Advisory: OpenShift Container Platform 4.6.57 security and extras update | moby: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 4.8 | null | null |
RHSA-2019:2043 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service kernel: Buffer overflow in hidp_process_report kernel: HID: debug: Buffer overflow in hid_debug_events_read() in dr... | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.7 | 5.5 | null |
RHSA-2016:0723 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unre... | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linu... | null | null | null | null |
RHSA-2023:7398 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: net/sched: cls_u32 ... | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7 | null | null |
RHSA-2023:0607 | Red Hat Security Advisory: thunderbird security update | Mozilla: Revocation status of S/Mime signature certificates was not checked | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:2875 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers jose-go: improper handling of highly compressed data ironic-image: Unauthenticated local access to Ironic API | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.7 | 7.5 | null |
RHSA-2016:1079 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 ... | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2006:0191 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2017:1259 | Red Hat Security Advisory: spacewalk-backend security update | spacewalk-backend: spacewalk-channel can be used by non-admin or disabled users for performing administrative tasks | [
"cpe:/a:redhat:network_satellite:5.6::el5",
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 6.5 | null |
RHSA-2012:0682 | Red Hat Security Advisory: tomcat6 security and bug fix update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: password disclosure vulnerability tomcat: security manager restrictions bypass tomcat: authentication bypass and information disclosure tomcat: information disclosure due to improper response and request object recycling tomcat: hash table collisions CPU... | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2013:0577 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 - End Of Life | This is the End of Life notification for Red Hat Enterprise
Virtualization 2. | [] | null | null | null | null |
RHSA-2022:5331 | Red Hat Security Advisory: libinput security update | libinput: format string vulnerability may lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2021:1307 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2017:2450 | Red Hat Security Advisory: openstack-neutron security update | openstack-neutron: iptables not active after update | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.3 | null |
RHSA-2018:2729 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform security update | openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 4.7 | null |
RHSA-2024:2085 | Red Hat Security Advisory: libreswan security and bug fix update | libreswan: Missing PreSharedKey for connection can cause crash | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 5 | null | null |
RHSA-2024:1404 | Red Hat Security Advisory: kernel security and bug fix update | kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c kernel: nfp: use-after-free in area_cache_get() kernel: Rate limit overflow messages in r8152 in intr_callback kernel: tun: avoid double free in tun_free_netdev kernel: double free in usb_8dev_start... | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2019:2437 | Red Hat Security Advisory: Red Hat Virtualization security update | sssd: improper implementation of GPOs due to too restrictive permissions rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled edk2: stack overflow in XHCI causing denial of service openssl: 0-byte record padding oracle cockpit-ovirt: admin and appliance passwords saved in plain text variable file... | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 5.9 | 9.8 | null |
RHSA-2018:1216 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:2882 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing... | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.1 | null | null |
RHSA-2012:0529 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update | qpid-cpp: cluster authentication ignores cluster-* settings | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2018:2267 | Red Hat Security Advisory: procps security update | procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 4.8 | null |
RHSA-2012:1331 | Red Hat Security Advisory: JBoss Operations Network 3.1.1 update | tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_operations_network:3.1"
] | null | null | null | null |
RHSA-2022:6187 | Red Hat Security Advisory: Node Health Check Operator 0.3.1 security update | golang: net/http: improper sanitization of Transfer-Encoding header golang: crypto/elliptic: panic caused by oversized scalar golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:workload_availability_node_healthcheck:0.3::el8"
] | null | 7.5 | null | null |
RHSA-2022:8502 | Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.3] bug fix and security update | follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor ovirt-engine: RHVM admin password is logged unfiltered when using otopi-style | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 5.1 | null | null |
RHSA-2021:1086 | Red Hat Security Advisory: 389-ds:1.4 security and bug fix update | 389-ds-base: information disclosure during the binding of a DN | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2021:2965 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.8 security update | wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 5.9 | null | null |
RHSA-2013:1173 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: Bluetooth: HCI & L2CAP information leaks Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB kernel: sctp: duplicate cookie handling NULL pointer dereference kernel: net: IP_REPOPTS invalid free Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg Kernel: net: af_key: initialize satype i... | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2002:289 | Red Hat Security Advisory: mysql security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2020:1840 | Red Hat Security Advisory: openssl security and bug fix update | openssl: side-channel weak encryption vulnerability openssl: information disclosure in fork() openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.7 | null |
RHSA-2024:6033 | Red Hat Security Advisory: openldap security update | openldap: null pointer dereference in ber_memalloc_x function | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.1 | null | null |
RHSA-2019:1488 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Double free in lib/idr.c Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote ... | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2019:4099 | Red Hat Security Advisory: OpenShift Container Platform 4.2 csi-provisioner-container security update | kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 4.8 | null |
RHSA-2022:0843 | Red Hat Security Advisory: thunderbird security update | thunderbird: Crafted email could trigger an out-of-bounds write expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-afte... | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:4162 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5 | null | null |
RHSA-2009:1024 | Red Hat Security Advisory: Red Hat Enterprise Linux 4.8 kernel security and bug fix update | kernel: nfsv4 client can be crashed by stating a long filename kernel: exit_notify: kill the wrong capable(CAP_KILL) check | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:0919 | Red Hat Security Advisory: kernel security update | kernel: infiniband: uverbs: unprotected physical memory access | [
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2023:4950 | Red Hat Security Advisory: firefox security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption... | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:8831 | Red Hat Security Advisory: bcc security update | bcc: unprivileged users can force loading of compromised linux headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 2.8 | null | null |
RHSA-2016:1635 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 Service Pack 1 security update | HTTPD: sets environmental variable based on user supplied Proxy request header Tomcat: CGI sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el7"
] | null | null | 3.5 | null |
RHSA-2020:0609 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in fs/xfs/xfs_super.c kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg8021... | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 8 | 8 | null |
RHSA-2009:1549 | Red Hat Security Advisory: wget security update | wget: incorrect verification of SSL certificate with NUL in name | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redh... | null | null | null | null |
RHSA-2011:0507 | Red Hat Security Advisory: apr security update | apr: unconstrained recursion in apr_fnmatch | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::serv... | null | null | null | null |
RHSA-2010:0768 | Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update | TLS: MITM attacks via session renegotiation OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage... | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4956 | Red Hat Security Advisory: thunderbird security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption... | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4541 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: OOB access in the Linux k... | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2024:8697 | Red Hat Security Advisory: OpenShift Container Platform 4.14.40 bug fix and security update | golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack ex... | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2020:0556 | Red Hat Security Advisory: Open Liberty 20.0.0.2 Runtime security update | Open Liberty 20.0.0.2 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in ... | [
"cpe:/a:openliberty:20"
] | null | null | null | null |
RHSA-2018:2552 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
] | null | null | 8.1 | null |
RHSA-2024:4101 | Red Hat Security Advisory: samba security update | samba: infinite loop in mdssvc RPC service for spotlight | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2020:1350 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in WebAudio chromium-browser: Use after free in WebAudio chromium-browser: Heap buffer overflow in media chromium-browser: Inappropriate implementation in V8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2021:4788 | Red Hat Security Advisory: krb5 security update | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2018:0517 | Red Hat Security Advisory: libreoffice security update | libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.7 | null |
RHSA-2020:1665 | Red Hat Security Advisory: qt5 security, bug fix, and enhancement update | qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service qt5-qtimageformats: QTgaFile CPU exhaustion qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp qt5-qtbase: Out-of-bounds access in generateDirectionalRuns() function in qtextengine.cpp | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 4.3 | null |
RHSA-2018:2282 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Cross origin information leak in Blink chromium-browser: Cross origin information disclosure in Service Workers chromium-browser: Bad cast in DevTools chromium-browser: Local file write in DevTools chromium-browser: Stack buffer overflow in Skia chromium-browser: Heap buffer overflow in WebGL chromium... | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2022:7192 | Red Hat Security Advisory: device-mapper-multipath security update | device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2021:4590 | Red Hat Security Advisory: rust-toolset:rhel8 security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.5 | null | null |
RHBA-2007:0331 | Red Hat Bug Fix Advisory: conga bug fix update | security flaw security flaw | [
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2016:1238 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 ... | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:5086 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite golang: net: lookup functions may r... | [
"cpe:/a:redhat:openshift_data_foundation:4.9::el8"
] | null | 8.1 | null | null |
RHSA-2023:3373 | Red Hat Security Advisory: Migration Toolkit for Runtimes security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:1197 | Red Hat Security Advisory: libldb security update | samba: Out of bounds read in AD DC LDAP server | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2024:1998 | Red Hat Security Advisory: libreswan security update | libreswan: Missing PreSharedKey for connection can cause crash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5 | null | null |
RHSA-2020:5607 | Red Hat Security Advisory: fapolicyd bug fix update | An update for fapolicyd is now available for Red Hat Enterprise Linux 8. | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.