id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2015:0778
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: combination of V8, Gamepad and IPC bugs that can lead to remote code execution chromium-browser: buffer overflow via race condition in GPU
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:3665
|
Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update
|
quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write
|
[
"cpe:/a:redhat:quay:3::el8"
] | null | 7.5 | null | null |
RHSA-2018:2317
|
Red Hat Security Advisory: xmlrpc security update
|
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2010:0969
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla add support for OTS font sanitizer (MFSA 2010-78) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:7201
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.12 security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.6 | null | null |
RHSA-2024:1836
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2021:2566
|
Red Hat Security Advisory: fwupd security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2005:709
|
Red Hat Security Advisory: gdb security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2504
|
Red Hat Security Advisory: libreport security update
|
libreport: Possible private data leak in Bugzilla bugs opened by ABRT
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:3623
|
Red Hat Security Advisory: nodejs:12 security and bug fix update
|
c-ares: Missing input validation of host names may lead to domain hijacking nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHEA-2015:0955
|
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 3.0.0 enhancement update
|
openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | 5.3 | null |
RHSA-2020:1828
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 2.9 | null |
RHSA-2023:4091
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update
|
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:1484
|
Red Hat Security Advisory: firefox security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHBA-2016:2206
|
Red Hat Bug Fix Advisory: evolution-data-server bug fix update
|
evolution-data-server: IMAPx Component Information Disclosure
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:6845
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.22 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2023:7885
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection postgresql: MERGE fails to enforce UPDATE or SELECT row security policies
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 3.1 | null | null |
RHSA-2025:0878
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.15 packages and security update
|
podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile
|
[
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 8.6 | null | null |
RHSA-2016:1293
|
Red Hat Security Advisory: setroubleshoot and setroubleshoot-plugins security update
|
setroubleshoot-plugins: insecure commands.getstatusoutput use in the allow_execmod plugin setroubleshoot-plugins: insecure commands.getoutput use in the allow_execstack plugin setroubleshoot: command injection issues
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2011:0177
|
Red Hat Security Advisory: webkitgtk security update
|
WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK webkit: input validation error when parsing certain NaN values webkit: use-after-free flaw in handling of selections webkit: memory corruption flaw when handling form menus webkit: use-after-free flaw when handling scrollbars webkit: memory corruption when handling SVG documents webkit: bad cast with text editing webkit: address bar spoofing with history bug webkit: memory corruption with MIME types webkit: DoS due to improper Ruby support webkit: DoS via improper handling of counter nodes webkit: stale pointer issue with focusing webkit: cross-origin image theft webkit: Integer overflow in WebKit's handling of Text objects webkit: HTMLLinkElement ignores dnsPrefetchingEnabled setting WebKit: Use-after-free vulnerabiity related to text editing causes memory corruption WebKit: Memory corruption due to improper handling of large text area WebKit: Use-after-free vulnerability related frame object WebKit: Array index error during processing of an SVG document webkit: CSS Font Face Parsing Type Confusion Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:0283
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: possible kernel oops from user MSS kernel: perf bug kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1856
|
Red Hat Security Advisory: opencryptoki security update
|
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
|
[
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.9 | null | null |
RHSA-2023:7205
|
Red Hat Security Advisory: nodejs:20 security update
|
nodejs: integrity checks according to policies can be circumvented nodejs: permission model improperly protects against path traversal nodejs: path traversal through path stored in Uint8Array nodejs: code injection via WebAssembly export names HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) node-undici: cookie leakage
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | null | null |
RHSA-2024:3757
|
Red Hat Security Advisory: ipa security update
|
freeipa: delegation rules allow a proxy service to impersonate any user to access another target service freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8.1 | null | null |
RHSA-2023:2705
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 7
|
okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 5.3 | null | null |
RHSA-2008:0223
|
Red Hat Security Advisory: seamonkey security update
|
Firefox JavaScript garbage collection crash
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1783
|
Red Hat Security Advisory: tigervnc security, bug fix, and enhancement update
|
tigervnc: certificate exceptions stored as authorities
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2025:0876
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.15 bug fix and security update
|
Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.3 | null | null |
RHSA-2022:7089
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow may lead to remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null |
RHBA-2023:3052
|
Red Hat Bug Fix Advisory: cifs-utils bug fix and enhancement update
|
cifs-utils: stack-based buffer overflow mount.cifs may lead to local privilege escalation to root
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2022:0635
|
Red Hat Security Advisory: curl security update
|
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 6.1 | null | null |
RHSA-2018:2317
|
Red Hat Security Advisory: xmlrpc security update
|
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2020:4277
|
Red Hat Security Advisory: kernel security update
|
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.3 | null | null |
RHSA-2015:1534
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: netfilter connection tracking extensions denial of service kernel: execution in the early microcode loader kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:3220
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver may allow an unauthenticated user to potentially enable DoS via adjacent access kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver kernel: kernel: DAX hugepages not considered during mremap kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
RHSA-2024:3402
|
Red Hat Security Advisory: mod_http2 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0778
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.56 security update
|
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2014:0763
|
Red Hat Security Advisory: rubygem-openshift-origin-node security update
|
Origin: Command execution as root via downloadable cartridge source-url
|
[
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2013:0688
|
Red Hat Security Advisory: Red Hat Enterprise Linux Advanced Mission Critical 5.3 1-Year Notice
|
This is the one-year notification for the retirement of Advanced Mission
Critical (AMC) for Red Hat Enterprise Linux 5.3.
|
[
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2015:0981
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2012:0069
|
Red Hat Security Advisory: ruby security update
|
ruby: hash table collisions CPU usage DoS (oCERT-2011-003)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0204
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2022:5719
|
Red Hat Security Advisory: grafana security update
|
grafana: OAuth account takeover
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.1 | null | null |
RHSA-2006:0708
|
Red Hat Security Advisory: php security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:8832
|
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
|
nodejs-minimatch: ReDoS via the braceExpand function nodejs: DNS rebinding in inspect via invalid octal IP address
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0758
|
Red Hat Security Advisory: Red Hat build of Quarkus 2.13.7 release and security update
|
SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions mina-sshd: Java unsafe deserialization vulnerability quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure
|
[
"cpe:/a:redhat:quarkus:2.13"
] | null | 5.3 | null | null |
RHSA-2014:0126
|
Red Hat Security Advisory: openldap security and bug fix update
|
openldap: segfault on certain queries with rwm overlay
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0500
|
Red Hat Security Advisory: hplip security, bug fix and enhancement update
|
hplip: insecure temporary file handling hplip: insecure temporary file handling flaws
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:3428
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: remote code execution in cups-filters, beh CUPS backend
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1144
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:rv:24.8) (MFSA 2014-67) Mozilla: Use-after-free setting text directionality (MFSA 2014-72)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:2180
|
Red Hat Security Advisory: gnupg2 security update
|
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2002:153
|
Red Hat Security Advisory: : Updated mm packages fix temporary file handling
|
security flaw
|
[
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2007:0940
|
Red Hat Security Advisory: kernel security update
|
Bound check ordering issue in random driver security flaw Locally triggerable memory consumption in usblcd NULL pointer dereference triggered by ptrace Privilege escalation via PR_SET_PDEATHSIG kernel LTC31426-4k page mapping support for userspace in 64k kernels prio_tree unit kernel panic kernel: Missing ioctl() permission checks in aacraid driver EM64T local DoS
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4265
|
Red Hat Security Advisory: cups security update
|
cups: Cupsd Listen arbitrary chmod 0140777
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null |
RHSA-2022:5556
|
Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
|
[
"cpe:/a:redhat:logging:5.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:4961
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/a:redhat:rhel_e4s:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2018:2097
|
Red Hat Security Advisory: patch security update
|
patch: Malicious patch files cause ed to execute arbitrary commands
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2014:0498
|
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 security update
|
1: Class Loader manipulation via request parameters
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2011:1799
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
|
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5"
] | null | null | null | null |
RHSA-2022:6969
|
Red Hat Security Advisory: Red Hat OpenStack Platform (tripleo-ansible) security update
|
tripleo-ansible: /var/lib/mistral/overcloud discoverable tripleo-ansible: /etc/openstack/clouds.yaml discoverable
|
[
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.3 | null | null |
RHSA-2016:1480
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.7 | null |
RHSA-2021:1898
|
Red Hat Security Advisory: python-lxml security update
|
python-lxml: mXSS due to the use of improper parser
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2017:0014
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: getenv and filenameforall ignore -dSAFER ghostscript: .libfile does not honor -dSAFER ghostscript: Type confusion in .initialize_dsc_parser allows remote code execution ghostscript: check for sufficient params in .sethalftone5
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.8 | null |
RHSA-2021:3327
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: powerpc: RTAS calls can be used to compromise kernel integrity kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7 | null | null |
RHSA-2022:8846
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (puppet) security update
|
puppet: silent configuration failure in agent
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 6.3 | null | null |
RHSA-2017:0194
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 7
|
openssl: Memory corruption in the ASN.1 encoder openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute mod_jk: Buffer overflow when concatenating virtual host name and URI mod_cluster: Protocol parsing logic error
|
[
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 4.3 | null |
RHSA-2009:1076
|
Red Hat Security Advisory: Red Hat Enterprise Linux 2.1 - End Of Life
|
This is the End Of Life notification for Red Hat Enterprise Linux 2.1.
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2012:1347
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020) kernel: sfc: potential remote denial of service through TCP MSS option
|
[
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2013:1195
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: Bluetooth: HCI & L2CAP information leaks Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB kernel: sctp: duplicate cookie handling NULL pointer dereference kernel: net: IP_REPOPTS invalid free Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg Kernel: net: af_key: initialize satype in key_notify_policy_flush
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2024:10895
|
Red Hat Security Advisory: Cost Management Metrics Operator Update
|
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
|
[
"cpe:/a:redhat:cost_management:3.3::el9"
] | null | 5.9 | null | null |
RHSA-2021:1030
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4.3 | null | null |
RHSA-2021:1032
|
Red Hat Security Advisory: perl security update
|
perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHBA-2020:5310
|
Red Hat Bug Fix Advisory: openvswitch2.13 bug fix and enhancement update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2017:2546
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.5 security update
|
jasypt: Vulnerable to timing attack against the password hash comparison batik: XML external entity processing vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
|
[
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 8.1 | null |
RHSA-2025:2708
|
Red Hat Security Advisory: firefox security update
|
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2017:0059
|
Red Hat Security Advisory: Red Hat Mobile Application Platform 4.2.1 Security Update - SDKs and RPMs
|
memcached: Server append/prepend remote code execution memcached: Server update remote code execution
|
[
"cpe:/a:redhat:mobile_application_platform:4.2"
] | null | null | 8.8 | null |
RHSA-2014:1336
|
Red Hat Security Advisory: python-django-horizon security and bug fix update
|
openstack-horizon: persistent XSS in Horizon Host Aggregates interface
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2022:7178
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:2852
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.0 for Quarkus 3.2 update is now available (RHBQ 3.2.12.GA)
|
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:camel_quarkus:3"
] | null | 7.4 | null | null |
RHSA-2023:4701
|
Red Hat Security Advisory: subscription-manager security update
|
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
RHSA-2024:6995
|
Red Hat Security Advisory: kernel-rt security update
|
hw: cpu: intel: Native Branch History Injection (BHI) kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
|
[
"cpe:/a:redhat:rhel_extras_rt_els:7"
] | null | 7.8 | null | null |
RHSA-2018:3834
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: Uninitialized memory access in the aesdecode operator (699665) ghostscript: Incorrect free logic in pagedevice replacement (699664) ghostscript: Incorrect "restoration of privilege" checking when running out of stack during exception handling ghostscript: User-writable error exception table ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) ghostscript: Saved execution stacks can leak operator arrays ghostscript: 1Policy operator allows a sandbox protection bypass ghostscript: Type confusion in setpattern (700141) ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2007:0894
|
Red Hat Security Advisory: mysql security update
|
mysql DROP privilege not enforced when renaming tables mysql SECURITY INVOKER functions do not drop privileges mysql malformed password crasher New release of MySQL fixes security bugs New release of MySQL fixes security bugs
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2016:0013
|
Red Hat Security Advisory: openstack-nova security and bug fix advisory
|
openstack-nova: network security group changes are not applied to running instances
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2003:060
|
Red Hat Security Advisory: : Updated NetPBM packages fix multiple vulnerabilities
|
security flaw
|
[
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2024:3676
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.17 security update
|
cri-o: malicious container can create symlink on host
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 8.1 | null | null |
RHSA-2020:4332
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2024:1007
|
Red Hat Security Advisory: gimp:2.8 security update
|
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2020:3940
|
Red Hat Security Advisory: openwsman security update
|
openwsman: Infinite loop in process_connection() allows denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHBA-2019:0327
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 images update
|
kube-rbac-proxy: Improper application of config allows for insecure ciphers and TLS 1.0
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 3.7 | null |
RHSA-2011:0413
|
Red Hat Security Advisory: glibc security update
|
glibc: fix causes linker to search CWD when running privileged program with $ORIGIN in R*PATH glibc: fnmatch() alloca()-based memory corruption flaw glibc: insufficient quoting in the locale command output glibc: ld.so insecure handling of privileged programs' RPATHs with $ORIGIN glibc: fnmatch() alloca()-based memory corruption flaw
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0306
|
Red Hat Security Advisory: ruby193-rubygem-actionpack security update
|
rubygem-actionpack: number_to_currency, number_to_percentage and number_to_human XSS vulnerability rubygem-actionpack: Action View string handling denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2017:3218
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
|
keycloak: SAML request parser replaces special strings with system properties
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 6.5 | null |
RHSA-2021:1135
|
Red Hat Security Advisory: squid security update
|
squid: improper input validation may allow a trusted client to perform HTTP request smuggling
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2022:4941
|
Red Hat Security Advisory: subversion:1.14 security update
|
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8830
|
Red Hat Security Advisory: bpftrace security update
|
bpftrace: unprivileged users can force loading of compromised linux headers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 2.8 | null | null |
RHSA-2021:3555
|
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.17.0
|
serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 6.5 | null | null |
RHSA-2022:7128
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Extension scripts replace objects not belonging to the extension.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
RHSA-2020:5170
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4 security release
|
tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
] | null | 7.5 | null | null |
RHSA-2019:2565
|
Red Hat Security Advisory: ruby security update
|
ruby: OpenSSL::X509:: Name equality check does not work correctly
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.