id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2006:0501
|
Red Hat Security Advisory: php security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2003:026
|
Red Hat Security Advisory: : Updated Netscape packages are now available
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2024:1675
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
|
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2008:0818
|
Red Hat Security Advisory: hplip security update
|
hpssd of hplip allows unprivileged user to trigger alert mail hplip hpssd.py Denial-Of-Service parsing vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1331
|
Red Hat Security Advisory: ipmitool security update
|
ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.1 | null | null |
RHSA-2002:170
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2018:2715
|
Red Hat Security Advisory: openstack-neutron security and bug fix update
|
openstack-neutron: A router interface out of subnet IP range results in a denial of service
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.5 | null |
RHSA-2014:0343
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update
|
tomcat: multiple content-length header poisoning flaws PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application 6: JSM policy not respected by deployed applications
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2018:1979
|
Red Hat Security Advisory: pki-core security, bug fix, and enhancement update
|
pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:3842
|
Red Hat Security Advisory: c-ares security update
|
c-ares: Out of bounds read in ares__read_line()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2022:5337
|
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
|
golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.2 | null | null |
RHSA-2009:1428
|
Red Hat Security Advisory: xmlsec1 security update
|
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2006
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: Heap buffer overflow in hiddev driver
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2024:1836
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2024:4755
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null |
RHSA-2008:0214
|
Red Hat Security Advisory: squid security update
|
squid: regression in SQUID-2007:2 / CVE-2007-6239
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:7512
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2021:4975
|
Red Hat Security Advisory: rpm security update
|
rpm: Signature checks bypass via corrupted rpm package
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 6.7 | null | null |
RHSA-2024:11219
|
Red Hat Security Advisory: edk2:20240524 security update
|
edk2: Integer overflows in PeCoffLoaderRelocateImage
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2014:0452
|
Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update
|
Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter XStream: remote code execution due to insecure XML deserialization Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0",
"cpe:/a:redhat:fuse_management_console:7.1.0",
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2020:2265
|
Red Hat Security Advisory: rh-haproxy18-haproxy security, bug fix, and enhancement update
|
haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.9 | null |
RHSA-2018:2626
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
yum-utils: reposync: improper path validation may lead to directory traversal
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8.8 | null |
RHSA-2005:476
|
Red Hat Security Advisory: openssl security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:2024
|
Red Hat Security Advisory: ntp security update
|
ntp: automatic generation of weak default key in config_auth() ntp: ntp-keygen uses weak random number generator and seed when generating MD5 keys ntp: Multiple buffer overflows via specially-crafted packets ntp: receive() missing return on error
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:0546
|
Red Hat Security Advisory: ceph security update
|
ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service
|
[
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | null | 7.3 | null |
RHSA-2007:0124
|
Red Hat Security Advisory: file security update
|
file 4.20 fixes a heap overflow in that can result in arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2010:0735
|
Red Hat Bug Fix Advisory: JBoss Enterprise Web Platform 5.1.0 update
|
JBossEAP status servlet info leak
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5"
] | null | null | null | null |
RHSA-2020:0683
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.5 openshift-enterprise-ansible-operator-container security update
|
openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 7 | null | null |
RHSA-2023:1406
|
Red Hat Security Advisory: nss security update
|
nss: Arbitrary memory write via PKCS 12
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1143
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: DoS with syscall auditing
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5484
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 7
|
nodejs-semver: Regular expression denial of service eap-7: heap exhaustion via deserialization wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor tough-cookie: prototype pollution in cookie memstore log4j1-socketappender: DoS via hashmap logging bouncycastle: potential blind LDAP injection attack using a self-signed certificate netty: SniHandler 16MB allocation leads to OOM
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 6.5 | null | null |
RHSA-2006:0708
|
Red Hat Security Advisory: php security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:3743
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.5.1 Security Update
|
tomcat: Infinite loop while reading an unexpected TLS packet when using OpenSSL JSSE engine
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.5"
] | null | 7.5 | null | null |
RHSA-2020:2637
|
Red Hat Security Advisory: gnutls security update
|
gnutls: session resumption works without master key allowing MITM
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2010:0896
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla cross-site information disclosure via modal calls Mozilla buffer overflow and memory corruption using document.write Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw Mozilla dangling pointer vulnerability in LookupGetterOrSetter Firefox race condition flaw (MFSA 2010-73)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:1805
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
|
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2023:4828
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2024:0234
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.4 | null | null |
RHSA-2024:10208
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.8 on RHEL 7 security update
|
netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible h2: Loading of custom classes from remote servers through JNDI OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) hsqldb: Untrusted input may lead to RCE attack CXF: SSRF Vulnerability eap-7: heap exhaustion via deserialization xnio: StackOverflowException when the chain of notifier states becomes problematically big log4j1-socketappender: DoS via hashmap logging apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7"
] | null | 8.8 | null | null |
RHSA-2021:3917
|
Red Hat Security Advisory: Red Hat Quay v3.6.0 security, bug fix and enhancement update
|
nodejs-debug: Regular expression Denial of Service nodejs-mime: Regular expression Denial of Service nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format nodejs-braces: Regular Expression Denial of Service (ReDoS) in lib/parsers.js lodash: Prototype pollution in utilities function hoek: Prototype pollution in utilities function nodejs-url-parse: incorrect hostname in url parsing nodejs-extend: Prototype pollution can allow attackers to modify object properties nodejs-stringstream: out-of-bounds read leading to uninitialized memory exposure nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS lodash: uncontrolled resource consumption in Data handler causing denial of service nodejs-yargs-parser: prototype pollution vulnerability nodejs-lodash: prototype pollution in zipObjectDeep function nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function nodejs-highlight-js: prototype pollution via a crafted HTML code block urijs: Hostname spoofing via backslashes in URL python-pillow: Buffer over-read in PCX image reader python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) nodejs-postcss: Regular expression denial of service during source map parsing nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c python-pillow: Negative-offset memcpy in TIFF image reader python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c python-pillow: Regular expression DoS in PDF format parser python-pillow: Out-of-bounds read in SGI RLE image reader nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise nodejs-urijs: mishandling certain uses of backslash may lead to confidentiality compromise python-pillow: Excessive memory allocation in BLP image reader python-pillow: Excessive memory allocation in ICNS image reader python-pillow: Excessive memory allocation in ICO image reader python-pillow: Buffer overflow in image convert function
|
[
"cpe:/a:redhat:quay:3::el8"
] | null | 5.9 | 4.4 | null |
RHSA-2020:2603
|
Red Hat Security Advisory: Red Hat build of Quarkus 1.3.4 security update
|
snakeyaml: Billion laughs attack via alias feature
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.6 | null | null |
RHSA-2008:0833
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update
|
Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
] | null | null | null | null |
RHSA-2022:1336
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.49 security update
|
haproxy: Denial of service via set-cookie2 header
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2011:1478
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
JDK: unspecified vulnerability fixed in 6u29 (Sound) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHBA-2021:3393
|
Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.2.0)
|
rubygem-addressable: ReDoS in templates
|
[
"cpe:/a:redhat:logging:5.2::el8"
] | null | 7.5 | null | null |
RHBA-2021:2508
|
Red Hat Bug Fix Advisory: openvswitch2.13 bug fix and enhancement update
|
openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2019:1833
|
Red Hat Security Advisory: CloudForms 4.7.7 security, bug fix and enhancement update
|
bubblewrap: temporary directory misuse as mount point
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 4.7 | null |
RHSA-2016:2848
|
Red Hat Security Advisory: Red Hat Ceph Storage 1.3 security, bug fix, and enhancement update
|
Ceph: RGW Denial of Service by sending null or specially crafted POST object requests
|
[
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | 6.5 | null |
RHSA-2018:1364
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: ns-slapd crash via large filter value in ldapsearch
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2021:0247
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
|
apache-httpclient: incorrect handling of malformed authority component in request URIs resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller undertow: special character in query results in server errors wildfly: Potential Memory leak in Wildfly when using OpenTracing
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7"
] | null | 5.9 | null | null |
RHSA-2024:1367
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: inactive elements in nft_pipapo_walk kernel: refcount leak in ctnetlink_create_conntrack() kernel: out-of-bounds write in qfq_change_class function kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2002:150
|
Red Hat Security Advisory: apache security update for Stronghold
|
security flaw
|
[
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2019:1278
|
Red Hat Security Advisory: pacemaker security update
|
pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS pacemaker: Information disclosure through use-after-free
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.3 | null |
RHSA-2012:1540
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: rds-ping cause kernel panic kernel: net: slab corruption due to improper synchronization around inet->opt kernel: ext4: AIO vs fallocate stale data exposure kernel: xen: VCPU timer overflow leads to PCPU deadlock and host death-by-watchdog kernel: xen: Memory mapping failure can crash Xen kernel: xen: XENMEM_exchange may overwrite hypervisor memory
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2675
|
Red Hat Security Advisory: pacemaker security update
|
pacemaker: Privilege escalation due to improper guarding of IPC communication
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | 8.8 | null |
RHSA-2011:0394
|
Red Hat Security Advisory: conga security update
|
plone: unauthorized remote administrative access
|
[
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2020:5023
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net-sysfs: *_queue_add_kobject refcount issue kernel: kernel: buffer over write in vgacon_scroll
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.6 | null | null |
RHSA-2023:7189
|
Red Hat Security Advisory: fwupd security update
|
fwupd: world readable password in /etc/fwupd/redfish.conf
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2024:8885
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update
|
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression jenkins: Exposure of multi-line secrets through error messages jenkins: Item creation restriction bypass vulnerability
|
[
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 5.3 | null | null |
RHSA-2023:0300
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: watch queue race condition can lead to privilege escalation kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i2c: unbounded length leads to buffer overflow in ismt_access() kernel: i915: Incorrect GPU TLB flush can lead to random memory access kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: nfsd buffer overflow by RPC message over TCP with garbage data
|
[
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.5 | null | null |
RHSA-2014:0029
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.0 update
|
Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler PicketBox: Insecure storage of masked passwords HawtJNI: predictable temporary file name leading to local arbitrary code execution JSF2: Multiple Information Disclosure flaws due to unsafe path traversal JGroups: Authentication via cached credentials Solr: directory traversal when loading XSL stylesheets and Velocity templates Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler Solr: XML eXternal Entity (XXE) flaw in DocumentAnalysisRequestHandler
|
[
"cpe:/a:redhat:jboss_data_grid:6.2.0"
] | null | null | null | null |
RHSA-2020:3383
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 7.5 | null | null |
RHSA-2010:0173
|
Red Hat Security Advisory: openssl096b security update
|
openssl: missing bn_wexpand return value checks
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0664
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 8 | 8 | null |
RHSA-2024:1314
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8 | null | null |
RHSA-2019:2504
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.11 openshift security update
|
kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 5 | null |
RHSA-2024:4571
|
Red Hat Security Advisory: OpenJDK 21.0.4 Security Update for Windows Builds
|
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
|
[
"cpe:/a:redhat:openjdk:21::windows"
] | null | 7.4 | null | null |
RHSA-2003:313
|
Red Hat Security Advisory: : Updated PostgreSQL packages fix buffer overflow
|
security flaw
|
[
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2012:0715
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Content Security Policy inline-script bypass (MFSA 2012-36) Mozilla: Information disclosure though Windows file shares and shortcut files (MFSA 2012-37) Mozilla: Use-after-free while replacing/inserting a node in a document (MFSA 2012-38) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0530
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2023:1592
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2021:2036
|
Red Hat Security Advisory: dotnet5.0 security and bugfix update
|
dotnet: .NET Core single-file application privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2014:1687
|
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
|
openstack-heat: authenticated information leak in Heat
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2022:7242
|
Red Hat Security Advisory: Satellite 6.11.4 Async Security Update
|
rubygem-rack: crafted multipart POST request may cause a DoS rubygem-tzinfo: arbitrary code execution
|
[
"cpe:/a:redhat:satellite:6.11::el7",
"cpe:/a:redhat:satellite:6.11::el8",
"cpe:/a:redhat:satellite_capsule:6.11::el7",
"cpe:/a:redhat:satellite_capsule:6.11::el8",
"cpe:/a:redhat:satellite_maintenance:6.11::el7",
"cpe:/a:redhat:satellite_maintenance:6.11::el8",
"cpe:/a:redhat:satellite_utils:6.11::el7",
"cpe:/a:redhat:satellite_utils:6.11::el8"
] | null | 7.5 | null | null |
RHSA-2023:5314
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.6 security and bug fix update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding distribution/distribution: DoS from malicious API request golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results containerd: Supplementary groups are not set up properly
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.1::el8"
] | null | 7.3 | null | null |
RHSA-2011:1615
|
Red Hat Security Advisory: virt-v2v security and bug fix update
|
virt-v2v: vnc password protection is missing after vm conversion
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0268
|
Red Hat Security Advisory: tomcat7 security update
|
Tomcat/JBoss Web - Bypass of CSRF prevention filter
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2024:3008
|
Red Hat Security Advisory: pmix security update
|
pmix: race condition allows attackers to obtain ownership of arbitrary files
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2019:0990
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7 | null |
RHSA-2023:1280
|
Red Hat Security Advisory: Synopsis: Red Hat OpenStack Platform (openstack-glance) security update
|
openstack: Arbitrary file access through custom VMDK flat descriptor
|
[
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.7 | null | null |
RHSA-2018:3158
|
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
|
sssd: information leak from the sssd-sudo responder
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.8 | null |
RHSA-2023:0205
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 3.7 | null | null |
RHSA-2024:10933
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update
|
undertow: information leakage via HTTP/2 request header reuse
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 0 | null | null |
RHSA-2021:1983
|
Red Hat Security Advisory: idm:DL1 security update
|
slapi-nis: NULL dereference (DoS) with specially crafted Binding DN
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2524
|
Red Hat Security Advisory: openvswitch security and bug fix update
|
dpdk: Information exposure in unchecked guest physical to host virtual address translations
|
[
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 6.1 | null |
RHSA-2024:7504
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0712
|
Red Hat Security Advisory: kernel security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7 | null | null |
RHSA-2019:1197
|
Red Hat Security Advisory: libvirt security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 3.8 | null |
RHSA-2016:2641
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.3 for RHEL 7
|
undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 6.5 | null |
RHSA-2004:242
|
Red Hat Security Advisory: squid security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1376
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical 6-month Notice
|
This is the 6-month notification for the retirement of Red Hat Enterprise
Linux 5.3 Advanced Mission Critical (AMC).
|
[
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2018:0913
|
Red Hat Security Advisory: policycoreutils security, bug fix, and enhancement update
|
policycoreutils: Relabelling of symbolic links in /tmp and /var/tmp change the context of their target instead
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.9 | null |
RHSA-2012:1558
|
Red Hat Security Advisory: openstack-glance security update
|
OpenStack: Glance Authentication bypass for image deletion
|
[
"cpe:/a:redhat:openstack:1::el6"
] | null | null | null | null |
RHSA-2021:2727
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2012:1223
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0151
|
Red Hat Security Advisory: conga security, bug fix, and enhancement update
|
zope: XSS on error page plone: A reflected cross site scripting vulnerability
|
[
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHBA-2015:0364
|
Red Hat Bug Fix Advisory: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update
|
Mozilla: Out of bounds write in NSPR (MFSA 2014-55)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:3519
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.7 jenkins and openshift packages security update
|
jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links kubernetes: Node disk DOS by writing to container /etc/hosts
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 5.5 | null | null |
RHSA-2018:0002
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 6
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 9.8 | null |
RHSA-2024:6846
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 4.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.