id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:8897 | Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (instack-undercloud) security update | instack-undercloud: rsync leaks information to undercloud | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 7.5 | null | null |
RHSA-2021:4620 | Red Hat Security Advisory: freerdp security update | freerdp: improper client input validation for gateway connections allows to overwrite memory freerdp: improper region checks in all clients allow out of bound write to memory | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 8.8 | null | null |
RHSA-2019:2499 | Red Hat Security Advisory: ovirt-engine-metrics security, bug fix, and enhancement update | ovirt-engine-metrics: disclosure of sensitive passwords in log files and ansible playbooks | [
"cpe:/a:redhat:rhev_manager:4.3"
] | null | null | 5.9 | null |
RHSA-2020:1966 | Red Hat Security Advisory: kernel security update | kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 6.7 | null | null |
RHSA-2019:1571 | Red Hat Security Advisory: rhvm-appliance security, bug fix, and enhancement update | cockpit: Crash when parsing invalid base64 headers | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2016:1083 | Red Hat Security Advisory: ruby193-rubygem-katello security update | Katello: Authenticated sql injection via sort_by and sort_order request parameter | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite:6.1::el7"
] | null | null | null | null |
RHSA-2017:0213 | Red Hat Security Advisory: nagios security update | snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 7.3 | null |
RHSA-2025:1078 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8.3 for Spring Boot security update. | logback-core: arbitrary code execution via JaninoEventEvaluator mina-core: Apache MINA: applications using unbounded deserialization may allow RCE async-http-client: AsyncHttpClient (AHC) library's `CookieStore` replaces explicitly defined `Cookie`s | [
"cpe:/a:redhat:apache_camel_spring_boot:4.8.3"
] | null | 8.1 | null | null |
RHSA-2022:5699 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 security update | golang: syscall: faccessat checks wrong group | [
"cpe:/a:redhat:openshift_secondary_scheduler:1.0::el8"
] | null | 6.2 | null | null |
RHSA-2014:1070 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | This is the 3-year notification of the target date to migrate systems from
Red Hat Network Classic Hosted to Red Hat Subscription Management. All
systems using Red Hat Network Classic Hosted must be migrated to Red Hat
Subscription Management. | [] | null | null | null | null |
RHSA-2005:791 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:0065 | Red Hat Security Advisory: kernel security update | kernel: i40e: fix race condition by adding filter's intermediate sync state kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:1391 | Red Hat Security Advisory: ovn23.06 security update | ovn: insufficient validation of BFD packets may lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2025:0840 | Red Hat Security Advisory: OpenShift Container Platform 4.14.46 security update | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:5250 | Red Hat Security Advisory: libxml2 security update | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2022:6061 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHBA-2015:0040 | Red Hat Bug Fix Advisory: glusterfs enhancement update | glusterfs: fragment header infinite loop DoS | [
"cpe:/a:redhat:rhel_common:7::el7"
] | null | null | null | null |
RHSA-2007:0848 | Red Hat Security Advisory: openoffice.org security update | openoffice.org TIFF parsing heap overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2023:3205 | Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 5.3 | null | null |
RHSA-2022:6505 | Red Hat Security Advisory: openvswitch2.15 security update | dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2024:4386 | Red Hat Security Advisory: Red Hat JBoss EAP 7.4.17 XP 4.0.2 security release | jose4j: denial of service via specially crafted JWE undertow: url-encoded request path information can be broken on ajp-listener | [
"cpe:/a:redhat:jbosseapxp"
] | null | 7.5 | null | null |
RHSA-2023:7522 | Red Hat Security Advisory: OpenShift Virtualization 4.13.6 security and bug fix update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2017:2665 | Red Hat Security Advisory: openvswitch security update | openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 5.6 | null |
RHSA-2024:3325 | Red Hat Security Advisory: pcp security update | pcp: exposure of the redis server backend allows remote command execution via pmproxy | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2023:6933 | Red Hat Security Advisory: libreoffice security update | libreoffice: Empty entry in Java class path libreoffice: Array index underflow in Calc formula parsing libreoffice: Arbitrary file write libreoffice: Remote documents loaded without prompt via IFrame | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2018:2663 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update | RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5"
] | null | null | 9.8 | null |
RHSA-2024:2780 | Red Hat Security Advisory: nodejs:18 security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2023:0665 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2004:635 | Red Hat Security Advisory: ruby security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:0516 | Red Hat Security Advisory: evolution security and bug fix update | evolution: mailto URL scheme attachment header improper input validation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:4834 | Red Hat Security Advisory: expat security update | expat: Integer overflow in function XML_GetBuffer | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 9.8 | null | null |
RHSA-2009:0436 | Red Hat Security Advisory: firefox security update | firefox: does not properly prevent the literal rendering of homoglyph characters in IDN domain names (spoof URLs and conduct phishing attacks) Firefox 3 Layout engine crashes Firefox 2 and 3 Layout engine crash Firefox 3 JavaScript engine crashes Firefox 2 and 3 JavaScript engine crash jar: scheme ignores the content-disposition: header on the inner URI view-source: protocol Firefox XSS hazard using third-party stylesheets and XBL bindings Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString Firefox Malicious search plugins can inject code into arbitrary sites Firefox POST data sent to wrong site when saving web page with embedded frame javascript: URIs | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:11200 | Red Hat Security Advisory: expat security update | libexpat: expat: DoS via XML_ResumeParser | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 5.9 | null | null |
RHSA-2022:8796 | Red Hat Security Advisory: Red Hat OpenStack 16.1.9 (openstack-tripleo-heat-templates) security update | openstack-tripleo-heat-templates: data leak of internal URL through keystone_authtoken | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 4.3 | null | null |
RHSA-2017:0879 | Red Hat Security Advisory: v8 security update | V8: integer overflow leading to buffer overflow in Zone::New | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.6 | null |
RHSA-2024:2551 | Red Hat Security Advisory: bind security update | bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2023:0673 | Red Hat Security Advisory: rh-varnish6-varnish security update | varnish: Request Forgery Vulnerability | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2024:3544 | Red Hat Security Advisory: nodejs:18 security update | nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 5.3 | null | null |
RHSA-2024:10289 | Red Hat Security Advisory: container-tools:rhel8 security update | podman: podman machine spawns gvproxy with port bound to all IPs golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2019:4356 | Red Hat Security Advisory: git security update | git: Arbitrary path overwriting via export-marks in-stream command feature git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/ git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams git: Remote code execution in recursive clones with nested submodules | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2022:6356 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: local root privilege escalation in the virtual machine | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7 | null | null |
RHSA-2011:0490 | Red Hat Security Advisory: java-1.4.2-ibm security update | JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2008:0957 | Red Hat Security Advisory: kernel security and bug fix update | kernel: local denial of service due to NT bit leakage kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible) kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP Linux kernel dccp_setsockopt_change() integer overflow kernel: missing boundary checks in syscall/syscall32_nopage() kernel: remove SUID when splicing into an inode kernel: open() call allows setgid bit when user is not in new file's group kernel: splice: fix bad unlock_page() in error case | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1997 | Red Hat Security Advisory: gnutls security update | gnutls: vulnerable to Minerva side-channel information leak | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.3 | null | null |
RHSA-2018:2152 | Red Hat Security Advisory: ansible security update | ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution | [
"cpe:/a:redhat:ansible_engine:2.4::el7"
] | null | null | 7.8 | null |
RHSA-2024:9814 | Red Hat Security Advisory: squid:4 security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1853 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 Retirement Notice | This is the final notification for the retirement of Red Hat Developer
Toolset Version 2. This notification applies only to those customers
subscribed to the channel for Red Hat Developer Toolset Version 2. | [] | null | null | null | null |
RHSA-2021:3431 | Red Hat Security Advisory: go-toolset-1.15-golang security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty | [
"cpe:/a:redhat:devtools:2021"
] | null | 5.3 | null | null |
RHSA-2024:1305 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:0135 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6 | null | null |
RHSA-2017:2423 | Red Hat Security Advisory: log4j security update | log4j: Socket receiver deserialization vulnerability log4j: deserialization of untrusted data in SocketServer | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | 8.1 | null |
RHSA-2022:0123 | Red Hat Security Advisory: thunderbird security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2016:1652 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: virtio: unbounded memory allocation on host via guest leading to DoS | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 3.4 | null |
RHSA-2020:0475 | Red Hat Security Advisory: Red Hat Quay v3.2.1 security update | nodejs-yarn: Install functionality can be abused to generate arbitrary symlinks | [
"cpe:/a:redhat:quay:3::el7"
] | null | 7.8 | null | null |
RHSA-2023:1887 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.3 security updates and bug fixes | http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization | [
"cpe:/a:redhat:multicluster_engine:2.2::el8"
] | null | 9.8 | null | null |
RHSA-2016:0100 | Red Hat Security Advisory: java-1.7.0-ibm security update | JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: underflow read in png_check_keyword() OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 8.8 | null |
RHSA-2024:0266 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.4 | null | null |
RHSA-2024:0500 | Red Hat Security Advisory: openssl security update | openssl: Incorrect cipher key and IV length processing | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2024:0725 | Red Hat Security Advisory: kernel-rt security update | kernel: sctp: fail if no bound addresses can be used for a given scope kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: drivers/usb/storage/ene_ub6250.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7 | null | null |
RHSA-2018:3008 | Red Hat Security Advisory: java-1.6.0-sun security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 6.5 | null |
RHSA-2011:1506 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 3-Month End Of Life Notice | This is the 3-month notification of the End Of Life plans for Red Hat
Enterprise Linux 4. | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:4317 | Red Hat Security Advisory: rh-maven35-apache-commons-beanutils security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.3 | null |
RHSA-2022:6179 | Red Hat Security Advisory: firefox security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2024:0575 | Red Hat Security Advisory: kernel security and bug fix update | kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: HID: check empty report_list in hid_validate_values() kernel: net/tls: tls_is_tx_ready() checked list_entry kernel: hid: Use After Free in asus_remove() kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: Use after free bug in r592_remove kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: smsusb: use-after-free caused by do_submit_urb() kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion kernel: mpls: double free on sysctl allocation failure kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c kernel: out-of-bounds write in qfq_change_class function kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() kernel: r592: race condition leading to use-after-free in r592_remove() kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7 | null | null |
RHSA-2023:7633 | Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security update | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc mariadb: segmentation fault via the component sub_select mariadb: server crash in st_select_lex_unit::exclude_level mariadb: server crash in JOIN_CACHE::free or in copy_fields mariadb: compress_write() fails to release mutex on failure mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2021:1809 | Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update | httpd: mod_session_cookie does not respect expiry time httpd: mod_proxy_uwsgi buffer overflow httpd: mod_http2 concurrent pool usage | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 5.4 | null |
RHSA-2024:10592 | Red Hat Security Advisory: thunderbird security update | thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1019 | Red Hat Security Advisory: kernel-rt security update | kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: GSM multiplexing race condition leads to privilege escalation kernel: inactive elements in nft_pipapo_walk kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.8 | null | null |
RHSA-2020:0951 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update | thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source EAP: Vault system property security attribute value is revealed on CLI 'reload' command wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | 7.5 | 7.4 | null |
RHSA-2006:0329 | Red Hat Security Advisory: mozilla security update | security flaw Firefox Tag Order Vulnerability security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHEA-2019:1283 | Red Hat Enhancement Advisory: RHUI 3.1 bug fix and enhancement update | pulp: Improper path parsing leads to overwriting of iso repositories | [
"cpe:/a:redhat:rhui:3::el7"
] | null | null | 6.8 | null |
RHSA-2016:0440 | Red Hat Security Advisory: openstack-heat bug fix and security advisory | openstack-heat: Vulnerability in Heat template validation leading to DoS | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2020:4390 | Red Hat Security Advisory: python-django security update | Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri() | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.3 | null |
RHSA-2022:1462 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 7 | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 5.9 | null | null |
RHSA-2024:9690 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2014:0126 | Red Hat Security Advisory: openldap security and bug fix update | openldap: segfault on certain queries with rwm overlay | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:11529 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | hornetq-core-client: Arbitrarily overwrite files or access sensitive information | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.1 | null | null |
RHSA-2021:0787 | Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update | dotnet: System.Text.Encodings.Web Remote Code Execution | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 8.1 | null | null |
RHSA-2024:2911 | Red Hat Security Advisory: thunderbird security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.1 | null | null |
RHSA-2024:6001 | Red Hat Security Advisory: postgresql:15 security update | postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2005:527 | Red Hat Security Advisory: openssh security update | security flaw openssh may set DISPLAY even if it's unable to listen on respective port | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:238 | Red Hat Security Advisory: : : : Updated 2.4 kernel fixes vulnerabilities | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:6051 | Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS kubeclient: kubeconfig parsing error can lead to MITM attacks prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:logging:5.5::el8"
] | null | 7.5 | null | null |
RHSA-2020:1520 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.3 release | tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Regression in handling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8"
] | null | 7.6 | null | null |
RHSA-2018:3533 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2014:0900 | Red Hat Security Advisory: kernel security and bug fix update | kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: futex: pi futexes requeue issue | [
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
RHSA-2017:1499 | Red Hat Security Advisory: ansible security update | ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) ansible: Security issue with lookup return not tainting the jinja2 environment | [
"cpe:/a:redhat:rhscon:2::el7"
] | null | null | 5.3 | null |
RHSA-2018:0007 | Red Hat Security Advisory: kernel security update | An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:198 | Red Hat Security Advisory: xorg-x11 security update | libxpm buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0726 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.1 update | apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2023:3582 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.3 | null | null |
RHSA-2008:0725 | Red Hat Security Advisory: rdesktop security and bug fix update | rdesktop: iso_recv_msg() Integer Underflow Vulnerability | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1486 | Red Hat Security Advisory: firefox security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHBA-2022:0793 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.8.34 packages update | cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host | [
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 4.2 | null | null |
RHSA-2021:3754 | Red Hat Security Advisory: httpd24-httpd security update | httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9 | null | null |
RHSA-2023:3922 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: cmd/go: go command may generate unexpected code at build time when using cgo golang: runtime: unexpected behavior of setuid/setgid binaries golang: cmd/go: go command may execute arbitrary code at build time when using cgo golang: cmd/cgo: Arbitrary code execution triggered by linker flags | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2016:0155 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2023:4325 | Red Hat Security Advisory: samba security and bug fix update | samba: SMB2 packet signing is not enforced when "server signing = required" is set | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2021:0700 | Red Hat Security Advisory: grub2 security update | grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2009:1206 | Red Hat Security Advisory: libxml and libxml2 security update | mingw32-libxml2: Stack overflow by parsing root XML element DTD definition mingw32-libxml2: Pointer use-after-free flaws by parsing Notation and Enumeration attribute types | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.