Datasets:

Modalities:
Tabular
Text
Formats:
parquet
Libraries:
Datasets
pandas
Dataset Viewer
Auto-converted to Parquet
id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:1289
Red Hat Security Advisory: CloudForms 4.6.9 security, bug fix and enhancement update
rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
5.9
null
RHSA-2007:0021
Red Hat Security Advisory: Adobe Acrobat Reader security update
security flaw security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3" ]
null
null
null
null
RHSA-2011:1380
Red Hat Security Advisory: java-1.6.0-openjdk security update
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: Hotspot unspecified issue (Hotspot, 7070134) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2018:1170
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Stack information leak in the EFS element
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.5
null
RHSA-2007:1082
Red Hat Security Advisory: firefox security update
jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2022:8959
Red Hat Security Advisory: rh-maven36-bcel security update
Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2024:1415
Red Hat Security Advisory: edk2 security update
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2022:0826
Red Hat Security Advisory: .NET 6.0 security and bugfix update
dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.3
null
null
RHSA-2023:6219
Red Hat Security Advisory: Red Hat Service Interconnect security update
skupper-operator: privelege escalation via config map
[ "cpe:/a:redhat:service_interconnect:1::el9" ]
null
6.8
null
null
RHSA-2022:6875
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2015:2696
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive Qemu: net: pcnet: buffer overflow in non-loopback mode
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2009:1453
Red Hat Security Advisory: pidgin security update
Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS) pidgin: ignores SSL/TLS requirements with old jabber servers Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) Pidgin: NULL pointer dereference by processing a custom smiley (DoS)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHEA-2015:0955
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 3.0.0 enhancement update
openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0" ]
null
null
5.3
null
RHSA-2021:3967
Red Hat Security Advisory: OpenJDK 11.0.13 security update for Portable Linux Builds
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:openjdk:11" ]
null
3.7
null
null
RHSA-2022:8494
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.1
null
null
RHSA-2010:0653
Red Hat Security Advisory: ImageMagick security update
GraphicsMagick: Integer overflow in the routine creating X11 images
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:4745
Red Hat Security Advisory: rh-varnish6-varnish security update
varnish: HTTP/1 request smuggling vulnerability
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
9.1
null
null
RHSA-2020:2968
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2017:1205
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: cirrus: heap buffer overflow via vnc connection Qemu: VNC: memory corruption due to unchecked resolution limit Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
5.5
null
RHSA-2023:5491
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.2 release and security update
keycloak: Untrusted Certificate Validation guava: insecure temporary directory creation apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale
[ "cpe:/a:redhat:amq_broker:7" ]
null
5.3
null
null
RHSA-2024:4367
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2018:3059
Red Hat Security Advisory: X.org X11 security, bug fix, and enhancement update
libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.5
null
RHBA-2023:2977
Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update
amd: Return Address Predictor vulnerability leading to information disclosure
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.6
null
null
RHSA-2022:6713
Red Hat Security Advisory: thunderbird security update
Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
7.5
null
RHSA-2008:0262
Red Hat Security Advisory: gpdf security update
xpdf: embedded font vulnerability
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:1838
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 on RHEL 6
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
7.5
null
RHSA-2022:4866
Red Hat Security Advisory: Satellite Tools 6.10.5 Async Bug Fix Update
puppet: unsafe HTTP redirect puppet: silent configuration failure in agent
[ "cpe:/a:redhat:rhel_satellite_tools:6.10::el6", "cpe:/a:redhat:rhel_satellite_tools:6.10::el7", "cpe:/a:redhat:rhel_satellite_tools:6.10::el8" ]
null
6.3
null
null
RHBA-2012:0013
Red Hat Bug Fix Advisory: libvirt bug fix and enhancement update
libvirt: unintended firewall port exposure after restarting libvirtd when defining a bridged forward-mode network
[ "cpe:/o:redhat:rhel_eus:6.2::server" ]
null
null
null
null
RHSA-2024:4400
Red Hat Security Advisory: booth security update
booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server
[ "cpe:/a:redhat:rhel_e4s:8.6::highavailability", "cpe:/a:redhat:rhel_tus:8.6::highavailability" ]
null
5.9
null
null
RHSA-2008:0601
Red Hat Security Advisory: adminutil security update
Server: multiple XSS issues
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2024:3752
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.7 release and security update
JSON-java: parser confusion leads to OOM keycloak: path transversal in redirection validation
[ "cpe:/a:redhat:amq_broker:7.10" ]
null
8.1
null
null
RHSA-2022:5894
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update.
minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.5
null
null
RHSA-2022:7058
Red Hat Security Advisory: OpenShift sandboxed containers 1.3.1 security fix and bug fix update
blender: Null pointer reference in blender thumbnail extractor golang: encoding/pem: fix stack overflow in Decode golang: path/filepath: stack exhaustion in Glob
[ "cpe:/a:redhat:openshift_sandboxed_containers:1.3.0::el8" ]
null
7.5
null
null
RHSA-2021:3444
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2023:4091
Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2012:1283
Red Hat Security Advisory: openjpeg security update
openjpeg: heap-based buffer overflow when decoding jpeg2000 files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:1852
Red Hat Security Advisory: openldap security, bug fix, and enhancement update
openldap: Double free vulnerability in servers/slapd/back-mdb/search.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2023:1591
Red Hat Security Advisory: pcs security update
webpack: avoid cross-realm objects
[ "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
9.1
null
null
RHSA-2022:6155
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement & bugfix update
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:openshift_data_foundation:4.11::el8" ]
null
7.5
null
null
RHSA-2007:0114
Red Hat Security Advisory: xen security update
HVM guest VNC server allows compromise of entire host OS by any VNC console user
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1157
Red Hat Security Advisory: Red Hat CloudForms Management Engine security update
interface: Ruby code injection
[ "cpe:/a:redhat:cloudforms:2.0" ]
null
null
null
null
RHSA-2021:3598
Red Hat Security Advisory: OpenShift Virtualization 4.8.2 Images security and bug fix update
golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:4.8::el8" ]
null
6.5
null
null
RHSA-2023:0661
Red Hat Security Advisory: Red Hat Fuse 7.11.1.P1 security update for Fuse on EAP
hazelcast: Hazelcast connection caching
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
9.1
null
null
RHSA-2010:0771
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: DoS on x86_64 kernel: net sched: fix some kernel memory leaks kernel: wireless: fix 64K kernel heap content leak via ioctl kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory kernel: drivers/net/eql.c: reading uninitialized stack memory
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2022:6520
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.5
null
null
RHSA-2024:0664
Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2024:5608
Red Hat Security Advisory: libreoffice security update
libreoffice: Ability to trust not validated macro signatures removed in high security mode
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.8
null
null
RHSA-2014:0886
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
null
null
RHSA-2003:081
Red Hat Security Advisory: zlib security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2006:0207
Red Hat Security Advisory: gnutls security update
- libtasn1 buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:1373
Red Hat Security Advisory: kernel security and bug fix update
kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7.8
null
null
RHSA-2020:3541
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
jenkins-jira-plugin: plugin information disclosure openshift-ansible: cors allowed origin allows changing url protocol jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links jenkins-2-plugins/matrix-project: Stored XSS vulnerability in single axis builds tooltips jenkins-2-plugins/matrix-project: Stored XSS vulnerability in multiple axis builds tooltips jenkins-2-plugins/matrix-auth: Stored XSS vulnerability in Matrix Authorization Strategy Plugin python-rsa: decryption of ciphertext leads to DoS
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7.5
null
null
RHSA-2022:5467
Red Hat Security Advisory: php:7.4 security update
php: password of excessive length triggers buffer overflow leading to RCE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2022:1198
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2023:5927
Red Hat Security Advisory: php:8.0 security update
php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: DoS vulnerability when parsing multipart request body php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHBA-2020:0690
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.38 packages update
jenkins-git-client-plugin: OS command injection via 'git ls-remote'
[ "cpe:/a:redhat:openshift:4.1::el7", "cpe:/a:redhat:openshift:4.1::el8" ]
null
8.8
null
null
RHSA-2021:0703
Red Hat Security Advisory: grub2 security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7.5
null
null
RHSA-2014:0994
Red Hat Security Advisory: openstack-keystone security update
openstack-keystone: privilege escalation through trust chained delegation openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id
[ "cpe:/a:redhat:openstack:3::el6", "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2023:6069
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.6
null
null
RHSA-2018:2598
Red Hat Security Advisory: opendaylight security and bug fix update
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.9
null
RHSA-2024:8048
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2020:1475
Red Hat Security Advisory: Red Hat CodeReady Workspaces 2.1.0 release
che: pods in kubernetes cluster can bypass JWT proxy and send unauthenticated requests to workspace pods
[ "cpe:/a:redhat:codeready_workspaces:2.0::el8" ]
null
6.4
null
null
RHSA-2024:8038
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHEA-2019:3848
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6
null
RHSA-2015:1514
Red Hat Security Advisory: bind security update
bind: TKEY query handling flaw leading to denial of service
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4549
Red Hat Security Advisory: ghostscript security update
ghostscript: OPVP device arbitrary code execution via custom Driver library
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.8
null
null
RHSA-2025:1300
Red Hat Security Advisory: gcc-toolset-14-gcc security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.1
null
null
RHSA-2010:0339
Red Hat Security Advisory: java-1.6.0-openjdk security update
TLS: MITM attacks via session renegotiation OpenJDK Loader-constraint table allows arrays instead of only the base-classes (6626217) OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) OpenJDK Inflater/Deflater clone issues (6745393) OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:1116
Red Hat Security Advisory: cyrus-imapd security update
cyrus-sasl: sasl_encode64() does not reliably null-terminate its output
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:2135
Red Hat Security Advisory: Red Hat Enterprise Linux 6.6 Extended Update Support Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 6.6 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.6.
[ "cpe:/o:redhat:rhel_eus:6.6::server" ]
null
null
null
null
RHSA-2024:1902
Red Hat Security Advisory: shim security update
shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.1
null
null
RHSA-2015:0917
Red Hat Security Advisory: Red Hat Satellite Server 5 - 30 Day End Of Life Notice
This is the 30 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.2 * Red Hat Satellite 5.3 * Red Hat Satellite 5.4 * Red Hat Satellite 5.5
[ "cpe:/a:redhat:network_satellite:5.2::el5", "cpe:/a:redhat:network_satellite:5.3::el5", "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
RHSA-2015:2315
Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update
NetworkManager: remote DoS using IPv6 RA with bogus MTU NetworkManager: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:2805
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2019:2817
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
6.4
null
RHSA-2024:3837
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2008:0891
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK JMX allows illegal operations with local monitoring (6332953)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2016:2597
Red Hat Security Advisory: firewalld security, bug fix, and enhancement update
firewalld: Firewall configuration can be modified by any logged in user
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.1
null
RHSA-2022:5070
Red Hat Security Advisory: OpenShift Container Platform 4.11.0 extras and security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.4
null
null
RHSA-2007:0813
Red Hat Security Advisory: openssl security update
openssl: RSA side-channel attack openssl: SSL_get_shared_ciphers() off-by-one
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2010:0622
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
libspice: Insufficient guest provided pointers validation libspice: Relying on guest provided data structures to indicate memory allocation qemu: Insufficient guest provided pointers validation kvm: vmx null pointer dereference qemu: insufficient constraints checking in exec.c:subpage_register() vdsm: SSL accept() blocks on a non-blocking Connection
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2022:1986
Red Hat Security Advisory: python3 security update
python: urllib: HTTP client possible infinite loop on a 100 Continue response python: ftplib should not use the host from the PASV response
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
RHSA-2017:0937
Red Hat Security Advisory: python-defusedxml and python-pysaml2 security update
python-pysaml2: Entity expansion issue
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
5.3
null
RHSA-2013:1790
Red Hat Security Advisory: kernel security and bug fix update
Kernel: Xen: Xsa-63: information leak via I/O instruction emulation
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:0290
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK Double.parseDouble Denial-Of-Service
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:5302
Red Hat Security Advisory: Red Hat build of Quarkus 1.7.5 SP1 release and security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.4
null
null
RHSA-2005:639
Red Hat Security Advisory: kdenetwork security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:2841
Red Hat Security Advisory: dnsmasq security update
dnsmasq: heap overflow in the code responsible for building DNS replies
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
9.8
null
RHSA-2023:0099
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2017:0932
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Null pointer dereference via keyctl kernel: Signed overflow for SO_{SND|RCV}BUFFORCE kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate) kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() kernel: use after free in dccp protocol
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
7.8
null
RHSA-2022:0002
Red Hat Security Advisory: grafana security update
golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2019:2662
Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 jenkins-2-plugins security update
jenkins-plugin-script-security: Sandbox bypass through type casts in Script Security Plugin jenkins-plugin-script-security: Sandbox bypass through method pointer expressions in Script Security Plugin jenkins-plugin-workflow-cps-global-lib: Missing permission check in Pipeline: Shared Groovy Libraries Plugin
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
4.3
null
RHSA-2023:1889
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
3.7
null
null
RHSA-2019:0832
Red Hat Security Advisory: polkit security update
polkit: Temporary auth hijacking via PID reuse and non-atomic fork
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
7.3
null
RHSA-2012:0345
Red Hat Security Advisory: jbossweb security and bug fix update
tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3" ]
null
null
null
null
RHSA-2024:8128
Red Hat Security Advisory: OpenJDK 21.0.5 Security Update for Portable Linux Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:21" ]
null
4.8
null
null
RHSA-2004:549
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:2863
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-prometheus security update
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
null
7.5
null
RHSA-2023:1329
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: crypto/tls: large handshake records may cause panics
[ "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2005:080
Red Hat Security Advisory: cpio security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
37