id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:1417 | Red Hat Security Advisory: libX11 security update | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.3 | null | null |
RHSA-2024:9430 | Red Hat Security Advisory: nano security update | nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.7 | null | null |
RHSA-2024:0559 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1629 | Red Hat Security Advisory: python33-python security update | python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5 | null |
RHBA-2024:4589 | Red Hat Bug Fix Advisory: Satellite 6.15.2 Async Update | foreman: Host ssh key not being checked in remote execution | [
"cpe:/a:redhat:satellite:6.15::el8",
"cpe:/a:redhat:satellite_capsule:6.15::el8",
"cpe:/a:redhat:satellite_utils:6.15::el8"
] | null | 6.8 | null | null |
RHSA-2018:3404 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.3 Extended Update Support One-Month Notice | This is the One-Month notification for the retirement of Red Hat Enterprise Linux 7.3 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.3. | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2024:0422 | Red Hat Security Advisory: perl-HTTP-Tiny security update | http-tiny: insecure TLS cert default | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.8 | null | null |
RHSA-2020:4129 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update | envoyproxy/envoy: incorrectly handles multiple HTTP headers in requests | [
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 8.3 | null | null |
RHSA-2013:1171 | Red Hat Security Advisory: condor security update | condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2022:5201 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes | golang.org/x/crypto: empty plaintext packet causes panic nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account Moment.js: Path traversal in moment.locale dset: Prototype Pollution in dset golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses | [
"cpe:/a:redhat:acm:2.4::el8"
] | null | 5.1 | null | null |
RHSA-2021:2203 | Red Hat Security Advisory: glib2 security update | glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 9.8 | null | null |
RHSA-2025:1609 | Red Hat Security Advisory: Cluster Observability Operator 1.0.0 | follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() follow-redirects: Possible credential leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:cluster_observability_operator:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2024:4976 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9"
] | null | 7.5 | null | null |
RHSA-2023:4655 | Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update | RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute | [
"cpe:/a:redhat:directory_server:11.6::el8"
] | null | 5.5 | null | null |
RHSA-2017:0113 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb() kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read() | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 3.6 | null |
RHSA-2009:0981 | Red Hat Security Advisory: util-linux security and bug fix update | util-linux: audit log injection via login | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0308 | Red Hat Security Advisory: OpenShift Container Storage 3.11.z security and bug fix update | golang: crypto/elliptic: incorrect operations on the P-224 curve golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header | [
"cpe:/a:redhat:storage:3.5:server:el7",
"cpe:/a:redhat:storage:3:client:el7"
] | null | 5.9 | null | null |
RHSA-2021:0620 | Red Hat Security Advisory: stunnel security update | stunnel: client certificate not correctly verified when redirect and verifyChain options are used | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2004:681 | Red Hat Security Advisory: samba security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2011:1534 | Red Hat Security Advisory: nfs-utils security, bug fix, and enhancement update | nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE nfs-utils: Improper authentication of an incoming request when an IP based authentication used | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1856 | Red Hat Security Advisory: rh-ror41-rubygem-actionview security update | rubygem-actionview: cross-site scripting flaw in Action View | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.1 | null |
RHSA-2022:1013 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update | guava: local information disclosure via temporary directory created with unsafe permissions bouncycastle: Timing issue within the EC math library mysql-connector-java: unauthorized access to critical kubernetes-client: Insecure deserialization in unmarshalYaml method protobuf-java: potential DoS in the parsing procedure for binary data maven: Block repositories using http by default jersey: Local information disclosure via system temporary directory jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way xml-security: XPath Transform abuse allows for information disclosure cron-utils: template Injection leading to unauthenticated Remote Code Execution h2: Remote Code Execution in Console | [
"cpe:/a:redhat:camel_quarkus:2.2.1"
] | null | 9.8 | null | null |
RHSA-2023:6813 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:3429 | Red Hat Security Advisory: cups-filters security update | cups-filters: remote code execution in cups-filters, beh CUPS backend | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2023:2248 | Red Hat Security Advisory: xorg-x11-server security and bug fix update | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2017:0246 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 7 | null |
RHSA-2020:2817 | Red Hat Security Advisory: rh-nginx116-nginx security update | nginx: HTTP request smuggling in configurations with URL redirect used as error_page | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2007:1049 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Local DoS with corrupted ELF fib_semantics.c out of bounds access vulnerability LTC36188-Don't allow the stack to grow into hugetlb reserved regions Privilege escalation via PR_SET_PDEATHSIG kernel: Missing ioctl() permission checks in aacraid driver | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:5942 | Red Hat Security Advisory: vim security update | vim: Out-of-bounds Write vim: out-of-bounds write in vim_regsub_both() in regexp.c vim: buffer over-read in utf_ptr2char() in mbyte.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2022:5813 | Red Hat Security Advisory: vim security update | vim: Out-of-bounds Write vim: out-of-bounds write in vim_regsub_both() in regexp.c vim: buffer over-read in utf_ptr2char() in mbyte.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2021:4140 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Intel graphics card information leak. kernel: out-of-bounds reads in pinctrl subsystem. kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers kernel: Fragmentation cache not cleared on reconnection kernel: Reassembling fragments encrypted under different keys kernel: wifi frame payload being parsed incorrectly as an L2 frame kernel: Forwarding EAPOL from unauthenticated wifi client kernel: accepting plaintext data frames in protected networks kernel: not verifying TKIP MIC of fragmented frames kernel: accepting fragmented plaintext frames in protected networks kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header kernel: accepting plaintext broadcast fragments as full frames kernel: reassembling encrypted fragments with non-consecutive packet numbers kernel: reassembling mixed encrypted/plaintext fragments kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c kernel: Improper access control in BlueZ may allow information disclosure vulnerability. kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c kernel: Linux kernel eBPF RINGBUF map oversized allocation kernel: double free in bluetooth subsystem when the HCI device initialization fails kernel: use-after-free in function hci_sock_bound_ioctl() kernel: eBPF 32-bit source register truncation on div/mod kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c kernel: DoS in rb_per_cpu_empty() kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure kernel: Race condition in sctp_destroy_sock list_del kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: local escalation of privileges in handling of eBPF programs kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory kernel: out of bounds array access in drivers/md/dm-ioctl.c kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier kernel: NULL-deref on disconnect regression kernel: possible buffer overflow in sysfs reading | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 6.4 | 5.5 | null |
RHSA-2008:0715 | Red Hat Security Advisory: nss_ldap security and bug fix update | nss_ldap randomly replying with wrong user's data | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0829 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.3 | null | null |
RHSA-2003:269 | Red Hat Security Advisory: : Updated KDE packages fix security issues | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2017:0254 | Red Hat Security Advisory: spice security update | spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:1820 | Red Hat Security Advisory: udisks2 security and bug fix update | udisks2: insecure defaults in user-accessible mount helpers allow for a DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 4.5 | null | null |
RHSA-2016:0540 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.2 update | bsh2: remote code execution via deserialization | [
"cpe:/a:redhat:jboss_brms:6.2"
] | null | null | 7.4 | null |
RHSA-2023:3429 | Red Hat Security Advisory: cups-filters security update | cups-filters: remote code execution in cups-filters, beh CUPS backend | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2022:4889 | Red Hat Security Advisory: thunderbird security update | Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2015:1979 | Red Hat Security Advisory: libreswan security and enhancement update | openswan: denial of service via IKE daemon restart when receiving a bad DH gx value | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:5928 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2022:7051 | Red Hat Security Advisory: OpenJDK 17.0.5 Security Update for Windows Builds | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
RHSA-2023:5459 | Red Hat Security Advisory: ghostscript security update | ghostscript: vulnerable to OS command injection due to mishandles permission validation for pipe devices | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.4 | null | null |
RHSA-2024:5832 | Red Hat Security Advisory: httpd security update | httpd: Security issues via backend applications whose response headers are malicious or exploitable | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 9.1 | null | null |
RHSA-2023:2764 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure python: CPU denial of service via inefficient IDNA decoder | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2020:2405 | Red Hat Security Advisory: freerdp security update | freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.3 | null | null |
Subsets and Splits