id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:3179 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7 | null |
RHSA-2022:2214 | Red Hat Security Advisory: zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.2 | null | null |
RHSA-2020:2103 | Red Hat Security Advisory: kernel security update | Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.9 | null | null |
RHSA-2016:2672 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: out of bounds memory access in v8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2021:2668 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2012:0683 | Red Hat Security Advisory: bind-dyndb-ldap security update | bind-dyndb-ldap: Bind DoS (named hang) by processing DNS query for zone served by bind-dyndb-ldap | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6287 | Red Hat Security Advisory: OpenShift Container Platform 4.11.3 packages and security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:5219 | Red Hat Security Advisory: kpatch-patch security update | kernel: buffer overflow in IPsec ESP transformation code | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2018:0015 | Red Hat Security Advisory: linux-firmware security update | An update for linux-firmware is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2022:7272 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update | Tomcat: Information disclosure tomcat: local privilege escalation vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7 | null | null |
RHSA-2005:018 | Red Hat Security Advisory: xpdf security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:3121 | Red Hat Security Advisory: httpd:2.4 security update | httpd: mod_macro: out-of-bounds read vulnerability mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1161 | Red Hat Security Advisory: freetype security update | BSD compress LZW decoder buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:7288 | Red Hat Security Advisory: openssl security update | OpenSSL: X.509 Email Address Buffer Overflow OpenSSL: X.509 Email Address Variable Length Buffer Overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2022:0041 | Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update | nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2003:315 | Red Hat Security Advisory: quagga security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
RHSA-2024:0800 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 9 | guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 6.5 | null | null |
RHSA-2024:2086 | Red Hat Security Advisory: shim security update | shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.1 | null | null |
RHSA-2015:1053 | Red Hat Security Advisory: php55 security and bug fix update | php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: NULL pointer dereference in pgsql extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2012:0321 | Red Hat Security Advisory: cvs security update | cvs: client proxy_connect heap-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2858 | Red Hat Security Advisory: OpenShift Container Platform 4.1.18 logging-elasticsearch5 security update | jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 9.8 | null |
RHSA-2018:0017 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.5 | null |
RHSA-2017:1220 | Red Hat Security Advisory: java-1.8.0-ibm security update | zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer JDK: XML External Entity Injection (XXE) error when processing XML data OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 3.7 | null |
RHSA-2021:0808 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: Use-after-free in P2P provision discovery processing | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2018:1060 | Red Hat Security Advisory: pcs security update | pcs: Privilege escalation via authorized user malicious REST call pcs: Debug parameter removal bypass, allowing information disclosure rack-protection: Timing attack in authenticity_token.rb | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.7 | null |
RHSA-2020:3495 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 6 | keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | 7.5 | null | null |
RHSA-2012:0743 | Red Hat Security Advisory: kernel security and bug fix update | kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl() kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON() kernel: macvtap: zerocopy: vector length is not validated before pinning user pages kvm: device assignment page leak kernel: fcaps: clear the same personality flags as suid when fcaps are used kernel: net: insufficient data_len validation in sock_alloc_send_pskb() kernel: kvm: buffer overflow in kvm_set_irq() kernel: rds-ping cause kernel panic kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1916 | Red Hat Security Advisory: httpd and mod_http2 security update | httpd: HTTP request splitting with mod_rewrite and mod_proxy | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 9.8 | null | null |
RHSA-2021:0313 | Red Hat Security Advisory: OpenShift Container Platform 4.5.31 bug fix and security update | openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250 | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.1 | null | null |
RHSA-2021:3934 | Red Hat Security Advisory: OpenShift Container Platform 4.9.4 packages and security update | coreos-installer: incorrect signature verification on gzip-compressed install images | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2023:4918 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 security update on RHEL 7 | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 7.5 | null | null |
RHSA-2018:0180 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: pmd can become dirty without going through a COW cycle | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.1 | null |
RHSA-2023:5974 | Red Hat Security Advisory: Network Observability security update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:network_observ_optr:1.4.0::el9"
] | null | 7.5 | null | null |
RHSA-2015:1137 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: fs: isofs: infinite loop in CE record entries kernel: use-after-free during key garbage collection kernel: isofs: unchecked printing of ER records kernel: panic while flushing nftables rules that reference deleted chains. kernel: Linux stack ASLR implementation Integer overflow kernel: pipe: iovec overrun leading to memory corruption kernel: int80 fork from 64-bit tasks mishandling | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:1051 | Red Hat Security Advisory: kdegraphics security update | CCITTFaxStream:: lookChar() | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:2177 | Red Hat Security Advisory: grafana-pcp security and enhancement update | golang: net/http: handle server errors after sending GOAWAY | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2012:0074 | Red Hat Security Advisory: jbossweb security update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2017:1228 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: race condition in webrtc | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2019:1579 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2019:3758 | Red Hat Security Advisory: patch security update | patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 7.8 | null |
RHSA-2025:1723 | Red Hat Security Advisory: postgresql:13 security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.1 | null | null |
RHSA-2022:1068 | Red Hat Security Advisory: expat security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 9.8 | null | null |
RHSA-2022:5267 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.8 | null | null |
RHSA-2014:1885 | Red Hat Security Advisory: libxml2 security update | libxml2: denial of service via recursive entity expansion | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0223 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | null | null |
RHSA-2025:1443 | Red Hat Security Advisory: nodejs:20 security update | undici: Undici Uses Insufficiently Random Values nodejs: Node.js Worker Thread Exposure via Diagnostics Channel nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | 7.7 | null |
RHSA-2024:5930 | Red Hat Security Advisory: bind security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2012:1301 | Red Hat Security Advisory: JBoss Enterprise Data Services Platform 5.3.0 update | Teiid: JDBC socket does not encrypt client login messages by default | [
"cpe:/a:redhat:jboss_enterprise_data_services:5.3"
] | null | null | null | null |
RHSA-2013:0681 | Red Hat Security Advisory: jakarta-commons-httpclient security update | jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | 3.7 | null |
RHSA-2024:3319 | Red Hat Security Advisory: kernel security update | hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2011:0465 | Red Hat Security Advisory: kdenetwork security update | kdenetwork: incomplete fix for CVE-2010-1000 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7222 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.2 security and bug fix update | nodejs-semver: Regular expression denial of service tough-cookie: prototype pollution in cookie memstore | [
"cpe:/a:redhat:rhmt:1.8::el8"
] | null | 6.5 | null | null |
RHSA-2009:0344 | Red Hat Security Advisory: libsoup security update | libsoup: integer overflow in soup_base64_encode() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:7769 | Red Hat Security Advisory: container-tools:rhel8 security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHBA-2020:0063 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 RPM release advisory | jenkins: Stored XSS vulnerability in expandable textbox form control jenkins: XSS vulnerability in combobox form control jenkins: Stored XSS vulnerability in SCM tag action tooltip jenkins: Stored XSS vulnerability in queue item tooltip jenkins: Diagnostic web page exposed Cookie HTTP header jenkins: XSS vulnerability in Jenkins URL setting golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.9 | 4.8 | null |
RHSA-2018:0030 | Red Hat Security Advisory: libvirt security update | An update for libvirt is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:0547 | Red Hat Security Advisory: seamonkey security update | Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:3044 | Red Hat Security Advisory: kpatch-patch security update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:6784 | Red Hat Security Advisory: ruby:3.3 security update | rexml: DoS vulnerability in REXML rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2018:2700 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 5 security and bug fix update | tomcat: A bug in the UTF-8 decoder can lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | null | 7.5 | null |
RHSA-2015:2083 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2024:0452 | Red Hat Security Advisory: curl security update | curl: information disclosure by exploiting a mixed case flaw | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.3 | null | null |
RHSA-2013:0608 | Red Hat Security Advisory: kvm security update | qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled | [
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2023:7403 | Red Hat Security Advisory: pixman security update | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7 | null | null |
RHSA-2024:1819 | Red Hat Security Advisory: OpenJDK 11.0.23 Security Update for Portable Linux Builds | OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) | [
"cpe:/a:redhat:openjdk:11"
] | null | 3.7 | null | null |
RHSA-2021:2119 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.6 (tripleo-ansible) security update | tripleo-ansible: ansible.log file is visible to unprivileged users | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2022:1284 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2022:5681 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 7.5 | null | null |
RHSA-2008:0135 | Red Hat Security Advisory: tk security update | Tk GIF processing buffer overflow tk: GIF handling buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2024:6680 | Red Hat Bug Fix Advisory: nss bug fix and enhancement update | Mozilla: Memory corruption in NSS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.1 | null | null |
RHSA-2021:3944 | Red Hat Security Advisory: redis:5 security update | redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0347 | Red Hat Security Advisory: openldap security update | openldap: forwarded bind failure messages cause success openldap: rootpw not verified via slapd.conf when using the NDB backend openldap: DoS when submitting special MODRDN request | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:0271 | Red Hat Security Advisory: systemd security update | systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.5 | null |
RHSA-2004:505 | Red Hat Security Advisory: Updated kernel packages fix security vulnerability | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2018:0275 | Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update | artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 4.3 | null |
RHSA-2008:0877 | Red Hat Security Advisory: jbossweb security update | tomcat: Cross-Site-Scripting enabled by sendError call tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2024:8180 | Red Hat Security Advisory: webkit2gtk3 security update | chromium-browser: Use after free in ANGLE webkit: malicious website may exfiltrate audio data cross-origin webkit: processing malicious web content prevents Content Security Policy from being enforced webkit: maliciously crafted webpage may be able to fingerprint the user webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkit: Processing maliciously crafted web content may lead to memory corruption | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2015:0752 | Red Hat Security Advisory: openssl security update | openssl: use-after-free on invalid EC private key import openssl: invalid pointer use in ASN1_TYPE_cmp() openssl: ASN.1 structure reuse memory corruption openssl: X509_to_X509_REQ NULL pointer dereference openssl: PKCS7 NULL pointer dereference openssl: integer underflow leading to buffer overflow in base64 decoding openssl: assertion failure in SSLv2 servers openssl: Divide-and-conquer session key recovery in SSLv2 openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers | [
"cpe:/a:redhat:storage:2.1:server:el6"
] | null | null | null | null |
RHSA-2024:8675 | Red Hat Security Advisory: buildah security update | buildah: Buildah allows arbitrary directory mount | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2024:2184 | Red Hat Security Advisory: libsndfile security update | libsndfile: integer overflow in src/mat4.c and src/au.c leads to DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2024:3859 | Red Hat Security Advisory: kernel security update | kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: wifi: mac80211: fix potential key use-after-free | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.8 | null | null |
RHSA-2024:11122 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2022:7323 | Red Hat Security Advisory: python3.9 security update | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2023:3490 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2023:4464 | Red Hat Security Advisory: firefox security update | Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2023:3920 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | golang: cmd/go: go command may generate unexpected code at build time when using cgo golang: runtime: unexpected behavior of setuid/setgid binaries golang: cmd/go: go command may execute arbitrary code at build time when using cgo golang: cmd/cgo: Arbitrary code execution triggered by linker flags | [
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
RHSA-2003:274 | Red Hat Security Advisory: pine security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:9071 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null |
RHSA-2022:5317 | Red Hat Security Advisory: libxml2 security update | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2023:7784 | Red Hat Security Advisory: postgresql security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2019:4056 | Red Hat Security Advisory: kernel security update | kernel: Memory corruption due to incorrect socket cloning Kernel: page cache side channel attacks | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7.1 | null |
RHSA-2022:7068 | Red Hat Security Advisory: firefox security update | Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHBA-2024:0611 | Red Hat Bug Fix Advisory: updated Red Hat Enterprise Linux 9 container images | kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy() | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2018:0055 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2024:0989 | Red Hat Security Advisory: Red Hat Multicluster GlobalHub 1.0.2 bug fixes and security updates | go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:multicluster_globalhub:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2008:0897 | Red Hat Security Advisory: ruby security update | ruby: webrick directory traversal ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions ruby: WEBrick DoS vulnerability (CPU consumption) ruby: missing "taintness" checks in dl module ruby: DoS vulnerability in the REXML module ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2006:0592 | Red Hat Security Advisory: tomcat security update for Red Hat Application Server | tomcat examples XSS | [
"cpe:/a:redhat:rhel_application_server:1"
] | null | null | null | null |
RHSA-2024:9092 | Red Hat Security Advisory: freerdp security update | freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data freerdp: integer underflow in nsc_rle_decode freerdp: OutOfBound Read in zgfx_decompress_segment freerdp: OutOfBound Read in planar_skip_plane_rle freerdp: out-of-bounds read in ncrush_decompress freerdp: OutOfBound Read in interleaved_decompress FreeRDP: ExtractRunLengthRegular* out of bound read freerdp: freerdp_image_copy out of bound read freerdp: zgfx_decompress out of memory freerdp: rdp_write_logon_info_v1 NULL access freerdp: out-of-bounds read | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2015:1667 | Red Hat Security Advisory: httpd security update | httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2020:3864 | Red Hat Security Advisory: cups security and bug fix update | cups: DNS rebinding attacks via incorrect whitelist cups: stack-buffer-overflow in libcups's asn1_get_type function cups: stack-buffer-overflow in libcups's asn1_get_packed function | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.