id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:1289 | Red Hat Security Advisory: CloudForms 4.6.9 security, bug fix and enhancement update | rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 5.9 | null |
RHSA-2007:0021 | Red Hat Security Advisory: Adobe Acrobat Reader security update | security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3"
] | null | null | null | null |
RHSA-2011:1380 | Red Hat Security Advisory: java-1.6.0-openjdk security update | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: Hotspot unspecified issue (Hotspot, 7070134) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2018:1170 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Stack information leak in the EFS element | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.5 | null |
RHSA-2007:1082 | Red Hat Security Advisory: firefox security update | jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2022:8959 | Red Hat Security Advisory: rh-maven36-bcel security update | Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2024:1415 | Red Hat Security Advisory: edk2 security update | edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:0826 | Red Hat Security Advisory: .NET 6.0 security and bugfix update | dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.3 | null | null |
RHSA-2023:6219 | Red Hat Security Advisory: Red Hat Service Interconnect security update | skupper-operator: privelege escalation via config map | [
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 6.8 | null | null |
RHSA-2022:6875 | Red Hat Security Advisory: kpatch-patch security update | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2015:2696 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive Qemu: net: pcnet: buffer overflow in non-loopback mode | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2009:1453 | Red Hat Security Advisory: pidgin security update | Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS) pidgin: ignores SSL/TLS requirements with old jabber servers Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) Pidgin: NULL pointer dereference by processing a custom smiley (DoS) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHEA-2015:0955 | Red Hat Enhancement Advisory: Red Hat JBoss Web Server 3.0.0 enhancement update | openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | 5.3 | null |
RHSA-2021:3967 | Red Hat Security Advisory: OpenJDK 11.0.13 security update for Portable Linux Builds | OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/a:redhat:openjdk:11"
] | null | 3.7 | null | null |
RHSA-2022:8494 | Red Hat Security Advisory: grub2 security update | grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.1 | null | null |
RHSA-2010:0653 | Red Hat Security Advisory: ImageMagick security update | GraphicsMagick: Integer overflow in the routine creating X11 images | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:4745 | Red Hat Security Advisory: rh-varnish6-varnish security update | varnish: HTTP/1 request smuggling vulnerability | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.1 | null | null |
RHSA-2020:2968 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2017:1205 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: cirrus: heap buffer overflow via vnc connection Qemu: VNC: memory corruption due to unchecked resolution limit Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | 5.5 | null |
RHSA-2023:5491 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.2 release and security update | keycloak: Untrusted Certificate Validation guava: insecure temporary directory creation apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale | [
"cpe:/a:redhat:amq_broker:7"
] | null | 5.3 | null | null |
RHSA-2024:4367 | Red Hat Security Advisory: pki-core security update | ca: token authentication bypass vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:3059 | Red Hat Security Advisory: X.org X11 security, bug fix, and enhancement update | libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.5 | null |
RHBA-2023:2977 | Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update | amd: Return Address Predictor vulnerability leading to information disclosure | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2022:6713 | Red Hat Security Advisory: thunderbird security update | Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2008:0262 | Red Hat Security Advisory: gpdf security update | xpdf: embedded font vulnerability | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1838 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 on RHEL 6 | jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 7.5 | null |
RHSA-2022:4866 | Red Hat Security Advisory: Satellite Tools 6.10.5 Async Bug Fix Update | puppet: unsafe HTTP redirect puppet: silent configuration failure in agent | [
"cpe:/a:redhat:rhel_satellite_tools:6.10::el6",
"cpe:/a:redhat:rhel_satellite_tools:6.10::el7",
"cpe:/a:redhat:rhel_satellite_tools:6.10::el8"
] | null | 6.3 | null | null |
RHBA-2012:0013 | Red Hat Bug Fix Advisory: libvirt bug fix and enhancement update | libvirt: unintended firewall port exposure after restarting libvirtd when defining a bridged forward-mode network | [
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2024:4400 | Red Hat Security Advisory: booth security update | booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server | [
"cpe:/a:redhat:rhel_e4s:8.6::highavailability",
"cpe:/a:redhat:rhel_tus:8.6::highavailability"
] | null | 5.9 | null | null |
RHSA-2008:0601 | Red Hat Security Advisory: adminutil security update | Server: multiple XSS issues | [
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2024:3752 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.7 release and security update | JSON-java: parser confusion leads to OOM keycloak: path transversal in redirection validation | [
"cpe:/a:redhat:amq_broker:7.10"
] | null | 8.1 | null | null |
RHSA-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2022:7058 | Red Hat Security Advisory: OpenShift sandboxed containers 1.3.1 security fix and bug fix update | blender: Null pointer reference in blender thumbnail extractor golang: encoding/pem: fix stack overflow in Decode golang: path/filepath: stack exhaustion in Glob | [
"cpe:/a:redhat:openshift_sandboxed_containers:1.3.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:3444 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:4091 | Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2012:1283 | Red Hat Security Advisory: openjpeg security update | openjpeg: heap-based buffer overflow when decoding jpeg2000 files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:1852 | Red Hat Security Advisory: openldap security, bug fix, and enhancement update | openldap: Double free vulnerability in servers/slapd/back-mdb/search.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2023:1591 | Red Hat Security Advisory: pcs security update | webpack: avoid cross-realm objects | [
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 9.1 | null | null |
RHSA-2022:6155 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement & bugfix update | golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar | [
"cpe:/a:redhat:openshift_data_foundation:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2007:0114 | Red Hat Security Advisory: xen security update | HVM guest VNC server allows compromise of entire host OS by any VNC console user | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1157 | Red Hat Security Advisory: Red Hat CloudForms Management Engine security update | interface: Ruby code injection | [
"cpe:/a:redhat:cloudforms:2.0"
] | null | null | null | null |
RHSA-2021:3598 | Red Hat Security Advisory: OpenShift Virtualization 4.8.2 Images security and bug fix update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:container_native_virtualization:4.8::el8"
] | null | 6.5 | null | null |
RHSA-2023:0661 | Red Hat Security Advisory: Red Hat Fuse 7.11.1.P1 security update for Fuse on EAP | hazelcast: Hazelcast connection caching | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.1 | null | null |
RHSA-2010:0771 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: DoS on x86_64 kernel: net sched: fix some kernel memory leaks kernel: wireless: fix 64K kernel heap content leak via ioctl kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory kernel: drivers/net/eql.c: reading uninitialized stack memory | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2022:6520 | Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update | dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion. | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 7.5 | null | null |
RHSA-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2024:5608 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.8 | null | null |
RHSA-2014:0886 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | PicketLink: XXE via insecure DocumentBuilderFactory usage | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
RHSA-2003:081 | Red Hat Security Advisory: zlib security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2006:0207 | Red Hat Security Advisory: gnutls security update | - libtasn1 buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1373 | Red Hat Security Advisory: kernel security and bug fix update | kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null |
RHSA-2020:3541 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | jenkins-jira-plugin: plugin information disclosure openshift-ansible: cors allowed origin allows changing url protocol jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links jenkins-2-plugins/matrix-project: Stored XSS vulnerability in single axis builds tooltips jenkins-2-plugins/matrix-project: Stored XSS vulnerability in multiple axis builds tooltips jenkins-2-plugins/matrix-auth: Stored XSS vulnerability in Matrix Authorization Strategy Plugin python-rsa: decryption of ciphertext leads to DoS | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2022:5467 | Red Hat Security Advisory: php:7.4 security update | php: password of excessive length triggers buffer overflow leading to RCE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:1198 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | null | null |
RHSA-2023:5927 | Red Hat Security Advisory: php:8.0 security update | php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: DoS vulnerability when parsing multipart request body php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHBA-2020:0690 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.38 packages update | jenkins-git-client-plugin: OS command injection via 'git ls-remote' | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | 8.8 | null | null |
RHSA-2021:0703 | Red Hat Security Advisory: grub2 security update | grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.5 | null | null |
RHSA-2014:0994 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: privilege escalation through trust chained delegation openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id | [
"cpe:/a:redhat:openstack:3::el6",
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:6069 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | python: TLS handshake bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.6 | null | null |
RHSA-2018:2598 | Red Hat Security Advisory: opendaylight security and bug fix update | guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.9 | null |
RHSA-2024:8048 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1475 | Red Hat Security Advisory: Red Hat CodeReady Workspaces 2.1.0 release | che: pods in kubernetes cluster can bypass JWT proxy and send unauthenticated requests to workspace pods | [
"cpe:/a:redhat:codeready_workspaces:2.0::el8"
] | null | 6.4 | null | null |
RHSA-2024:8038 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHEA-2019:3848 | Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update | hw: Intel SGX information leak | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6 | null |
RHSA-2015:1514 | Red Hat Security Advisory: bind security update | bind: TKEY query handling flaw leading to denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4549 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2025:1300 | Red Hat Security Advisory: gcc-toolset-14-gcc security update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2010:0339 | Red Hat Security Advisory: java-1.6.0-openjdk security update | TLS: MITM attacks via session renegotiation OpenJDK Loader-constraint table allows arrays instead of only the base-classes (6626217) OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) OpenJDK Inflater/Deflater clone issues (6745393) OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:1116 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-sasl: sasl_encode64() does not reliably null-terminate its output | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2135 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.6 Extended Update Support Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise Linux 6.6 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.6. | [
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | null | null |
RHSA-2024:1902 | Red Hat Security Advisory: shim security update | shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.1 | null | null |
RHSA-2015:0917 | Red Hat Security Advisory: Red Hat Satellite Server 5 - 30 Day End Of Life Notice | This is the 30 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.2
* Red Hat Satellite 5.3
* Red Hat Satellite 5.4
* Red Hat Satellite 5.5 | [
"cpe:/a:redhat:network_satellite:5.2::el5",
"cpe:/a:redhat:network_satellite:5.3::el5",
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6"
] | null | null | null | null |
RHSA-2015:2315 | Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update | NetworkManager: remote DoS using IPv6 RA with bogus MTU NetworkManager: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:2805 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2019:2817 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.4 | null |
RHSA-2024:3837 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2008:0891 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK JMX allows illegal operations with local monitoring (6332953) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2016:2597 | Red Hat Security Advisory: firewalld security, bug fix, and enhancement update | firewalld: Firewall configuration can be modified by any logged in user | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2022:5070 | Red Hat Security Advisory: OpenShift Container Platform 4.11.0 extras and security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.4 | null | null |
RHSA-2007:0813 | Red Hat Security Advisory: openssl security update | openssl: RSA side-channel attack openssl: SSL_get_shared_ciphers() off-by-one | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2010:0622 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | libspice: Insufficient guest provided pointers validation libspice: Relying on guest provided data structures to indicate memory allocation qemu: Insufficient guest provided pointers validation kvm: vmx null pointer dereference qemu: insufficient constraints checking in exec.c:subpage_register() vdsm: SSL accept() blocks on a non-blocking Connection | [
"cpe:/o:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2022:1986 | Red Hat Security Advisory: python3 security update | python: urllib: HTTP client possible infinite loop on a 100 Continue response python: ftplib should not use the host from the PASV response | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2017:0937 | Red Hat Security Advisory: python-defusedxml and python-pysaml2 security update | python-pysaml2: Entity expansion issue | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.3 | null |
RHSA-2013:1790 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: Xen: Xsa-63: information leak via I/O instruction emulation | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0290 | Red Hat Security Advisory: java-1.6.0-ibm security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:5302 | Red Hat Security Advisory: Red Hat build of Quarkus 1.7.5 SP1 release and security update | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.4 | null | null |
RHSA-2005:639 | Red Hat Security Advisory: kdenetwork security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:2841 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: heap overflow in the code responsible for building DNS replies | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 9.8 | null |
RHSA-2023:0099 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2017:0932 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Null pointer dereference via keyctl kernel: Signed overflow for SO_{SND|RCV}BUFFORCE kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate) kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() kernel: use after free in dccp protocol | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.8 | null |
RHSA-2022:0002 | Red Hat Security Advisory: grafana security update | golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2019:2662 | Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 jenkins-2-plugins security update | jenkins-plugin-script-security: Sandbox bypass through type casts in Script Security Plugin jenkins-plugin-script-security: Sandbox bypass through method pointer expressions in Script Security Plugin jenkins-plugin-workflow-cps-global-lib: Missing permission check in Pipeline: Shared Groovy Libraries Plugin | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.3 | null |
RHSA-2023:1889 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2019:0832 | Red Hat Security Advisory: polkit security update | polkit: Temporary auth hijacking via PID reuse and non-atomic fork | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 7.3 | null |
RHSA-2012:0345 | Red Hat Security Advisory: jbossweb security and bug fix update | tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3"
] | null | null | null | null |
RHSA-2024:8128 | Red Hat Security Advisory: OpenJDK 21.0.5 Security Update for Portable Linux Builds | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/a:redhat:openjdk:21"
] | null | 4.8 | null | null |
RHSA-2004:549 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:2863 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-prometheus security update | kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service | [
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | null | 7.5 | null |
RHSA-2023:1329 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: crypto/tls: large handshake records may cause panics | [
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2005:080 | Red Hat Security Advisory: cpio security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 37