Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/rubygem-ansi@1.4.3-3?arch=el7sat
purl pkg:rpm/redhat/rubygem-ansi@1.4.3-3?arch=el7sat
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (66)
Vulnerability Summary Fixed by
VCID-1mw1-384y-huc7
Aliases:
CVE-2013-2099
Uncontrolled Resource Consumption Algorithmic complexity vulnerability in the `ssl.match_hostname` function and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate. There are no reported fixed by versions.
VCID-1yu9-avtx-cybv
Aliases:
CVE-2015-1844
foreman: API not scoping resources to taxonomies There are no reported fixed by versions.
VCID-27wt-wmzc-1bc2
Aliases:
CVE-2018-6188
GHSA-rf4j-j272-fj86
PYSEC-2018-4
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. There are no reported fixed by versions.
VCID-2g54-3acq-pbha
Aliases:
CVE-2020-10716
rubygem-foreman_ansible: "User input" entry from Job Invocation may contain sensitive data There are no reported fixed by versions.
VCID-2y5d-qg7z-2kdg
Aliases:
CVE-2017-5929
GHSA-vmfg-rjjm-rjrj
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. There are no reported fixed by versions.
VCID-31h9-7jrr-9kdt
Aliases:
CVE-2016-1000340
GHSA-r97x-3g8f-gx3m
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers. There are no reported fixed by versions.
VCID-3af2-c1m7-3kdr
Aliases:
CVE-2019-10198
foreman: authorization bypasses in foreman-tasks leading to information disclosure There are no reported fixed by versions.
VCID-3t8t-yt9b-1fce
Aliases:
CVE-2016-10516
GHSA-h2fp-xgx6-xh6f
PYSEC-2017-43
Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message. There are no reported fixed by versions.
VCID-3ycr-9smk-uqdc
Aliases:
CVE-2015-3225
GHSA-rgr4-9jh5-j4j6
Potential Denial of Service Vulnerability Carefully crafted requests can cause a `SystemStackError` and potentially cause a denial of service attack. There are no reported fixed by versions.
VCID-3zeq-dyj1-8bdm
Aliases:
CVE-2018-1097
foreman: Ovirt admin password exposed by foreman API There are no reported fixed by versions.
VCID-5434-f6g7-8kdw
Aliases:
CVE-2015-3208
GHSA-x6rc-54xp-ccxx
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. There are no reported fixed by versions.
VCID-6fxc-s6ht-x7ht
Aliases:
CVE-2016-10745
GHSA-hj2j-77xm-mc5v
PYSEC-2019-220
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. There are no reported fixed by versions.
VCID-6wxf-ewtr-z3hb
Aliases:
CVE-2019-10906
GHSA-462w-v97r-4m45
PYSEC-2019-217
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. There are no reported fixed by versions.
VCID-6xkf-evrx-pyau
Aliases:
CVE-2016-2166
GHSA-f5cf-f7px-xpmh
Exposure of Sensitive Information to an Unauthorized Actor The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors. There are no reported fixed by versions.
VCID-73c1-6ytd-ykf9
Aliases:
CVE-2018-1096
foreman: SQL injection due to improper handling of the widget id parameter There are no reported fixed by versions.
VCID-77c9-jb1m-6qe2
Aliases:
CVE-2015-0203
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling There are no reported fixed by versions.
VCID-7f1h-1fw8-k7c4
Aliases:
CVE-2015-3155
foreman: the _session_id cookie is issued without the Secure flag There are no reported fixed by versions.
VCID-8wen-twwa-8khm
Aliases:
CVE-2014-3653
foreman: cross-site scripting (XSS) flaw in template preview screen There are no reported fixed by versions.
VCID-8xgm-pabz-hkeg
Aliases:
CVE-2017-10689
GHSA-vw22-465p-8j5w
Improper Privilege Management In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability. There are no reported fixed by versions.
VCID-9gb8-xvrc-aqgb
Aliases:
CVE-2015-0223
qpid-cpp: anonymous access to qpidd cannot be prevented There are no reported fixed by versions.
VCID-9wej-f7zx-pfeq
Aliases:
CVE-2019-12086
GHSA-5ww9-j83m-q7qx
Information exposure in FasterXML jackson-databind A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. There are no reported fixed by versions.
VCID-am23-ncy4-27ck
Aliases:
CVE-2017-15100
foreman: Stored XSS in fact name or value There are no reported fixed by versions.
VCID-bdms-nb18-guf9
Aliases:
CVE-2017-7233
GHSA-37hp-765x-j95x
PYSEC-2017-9
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack. There are no reported fixed by versions.
VCID-bhq3-j6aj-1yae
Aliases:
CVE-2019-10086
GHSA-6phf-73q6-gh87
Insecure Deserialization in Apache Commons Beanutils In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. There are no reported fixed by versions.
VCID-bsbd-bsbq-7qdk
Aliases:
CVE-2019-14825
GHSA-m4wh-848j-9w2r
Katello cleartext password storage issue A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. There are no reported fixed by versions.
VCID-bysx-t7fz-5kdk
Aliases:
CVE-2015-5245
Ceph: RGW returns requested bucket name raw in Bucket response header There are no reported fixed by versions.
VCID-ceub-d4s9-dkcd
Aliases:
CVE-2017-15095
GHSA-h592-38cm-4ggp
Deserialization of Untrusted Data A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the `readValue` method of the `ObjectMapper`. There are no reported fixed by versions.
VCID-crf9-zn1q-vya8
Aliases:
CVE-2015-6644
Bouncy Castle in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 24106146. There are no reported fixed by versions.
VCID-ddqw-aj7g-s7c2
Aliases:
CVE-2016-1000341
GHSA-r9ch-m4fh-fc7q
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well. There are no reported fixed by versions.
VCID-f4qa-9fn6-97az
Aliases:
CVE-2016-1000342
GHSA-qcj7-g2j5-g7r3
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. There are no reported fixed by versions.
VCID-f73y-mjrg-yfc9
Aliases:
CVE-2016-1000344
GHSA-2j2x-hx4g-2gf4
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. There are no reported fixed by versions.
VCID-fq2t-c2nv-23ce
Aliases:
CVE-2015-1609
A vulnerability in MongoDB can lead to a Denial of Service condition. There are no reported fixed by versions.
VCID-ftzy-9uny-byfb
Aliases:
CVE-2018-16887
GHSA-mhhc-r88h-2qrm
Cross-site Scripting A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before `3.9.0` are vulnerable. There are no reported fixed by versions.
VCID-hmcs-7s53-mbft
Aliases:
CVE-2019-3893
foreman: Recover of plaintext password or token for the compute resources There are no reported fixed by versions.
VCID-jae8-w85w-cyfu
Aliases:
CVE-2018-7537
GHSA-2f9x-5v75-3qv4
PYSEC-2018-6
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. There are no reported fixed by versions.
VCID-jau7-gfz8-dkfa
Aliases:
CVE-2009-3555
GHSA-f7w7-6pjc-wwm6
VU#120541
The renegotiation vulnerability in SSL protocol There are no reported fixed by versions.
VCID-jfqz-9a6e-jff7
Aliases:
CVE-2016-2100
foreman: Unprivileged user can access private bookmarks of other users There are no reported fixed by versions.
VCID-jr7u-m7gc-pydy
Aliases:
CVE-2016-1000339
GHSA-c8xf-m4ff-jcxj
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate. There are no reported fixed by versions.
VCID-jua2-2byr-t3cv
Aliases:
CVE-2016-1000338
GHSA-4vhj-98r6-424h
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. There are no reported fixed by versions.
VCID-ka8b-44hx-mkc5
Aliases:
CVE-2016-1000352
GHSA-w285-wf9q-5w69
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. There are no reported fixed by versions.
VCID-kwyu-yq4w-kqe4
Aliases:
CVE-2018-10237
GHSA-mvr2-9pj6-7w5j
Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable. There are no reported fixed by versions.
VCID-m29v-624x-kkha
Aliases:
CVE-2019-3891
candlepin: credentials exposure through log files There are no reported fixed by versions.
VCID-mv1p-yxvp-pbh6
Aliases:
CVE-2018-7536
GHSA-r28v-mw67-m5p9
PYSEC-2018-5
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable. There are no reported fixed by versions.
VCID-mv26-fzn6-vycf
Aliases:
CVE-2017-17718
GHSA-m7p8-9w66-9frm
No validation of hostname certificate Net-ldap does not validate the hostname certificate. Ruby is relying on OpenSSL, and one common mistake made by users of OpenSSL is to assume that OpenSSL will validate the hostname in the server's certificate. did not perform hostname validation. and up contain support for hostname validation, but they still require the user to call a few functions to set it up. There are no reported fixed by versions.
VCID-mwus-fmc5-27f2
Aliases:
CVE-2017-12175
6: XSS in discovery rule filter autocomplete functionality There are no reported fixed by versions.
VCID-nmya-eyxd-9ybe
Aliases:
CVE-2018-1000632
GHSA-6pcc-3rfx-4gpm
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. There are no reported fixed by versions.
VCID-pd7m-bhqf-kkge
Aliases:
CVE-2017-7536
GHSA-xxgp-pcfc-3vgc
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue(). There are no reported fixed by versions.
VCID-pyr1-73vu-93ej
Aliases:
CVE-2018-14664
foreman: Persisted XSS on all pages that use breadcrumbs There are no reported fixed by versions.
VCID-qr8s-5r61-skhw
Aliases:
CVE-2016-1000345
GHSA-9gp4-qrff-c648
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. There are no reported fixed by versions.
VCID-rc65-py17-kuhm
Aliases:
CVE-2015-1816
foreman: lack of SSL certificate validation when performing LDAPS authentication There are no reported fixed by versions.
VCID-rnuk-n3a6-cbh9
Aliases:
CVE-2018-16861
foreman: stored XSS in success notification after entity creation There are no reported fixed by versions.
VCID-sg6x-y34w-37bc
Aliases:
CVE-2018-1090
pulp: sensitive credentials revealed through the API There are no reported fixed by versions.
VCID-sqjb-qpyd-p7gn
Aliases:
CVE-2015-3235
foreman: edit_users permission allows changing of admin passwords There are no reported fixed by versions.
VCID-sw69-1r7d-kkht
Aliases:
CVE-2018-16470
GHSA-hg78-4f6x-99wq
Uncontrolled Resource Consumption There is a possible DoS vulnerability in the multipart parser in Rack. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. There are no reported fixed by versions.
VCID-tbug-mv5x-uucb
Aliases:
CVE-2013-4346
GHSA-4433-4cxq-vv73
PYSEC-2014-85
The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, which allows remote attackers to perform replay attacks via a signed URL. There are no reported fixed by versions.
VCID-tnen-a68v-9bfk
Aliases:
CVE-2016-1000343
GHSA-rrvx-pwf8-p59p
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. There are no reported fixed by versions.
VCID-va8w-uzhc-x3bz
Aliases:
CVE-2013-6668
security update There are no reported fixed by versions.
VCID-vhxh-tpay-mbh3
Aliases:
CVE-2015-0224
qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) There are no reported fixed by versions.
VCID-w543-qxxs-f7g7
Aliases:
CVE-2018-5382
GHSA-8477-3v39-ggpm
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself. There are no reported fixed by versions.
VCID-wbgc-tuj3-47by
Aliases:
CVE-2016-6346
GHSA-wxvr-vqfp-9cqw
Uncontrolled Resource Consumption RESTEasy enables `GZIPInterceptor`, which allows remote attackers to cause a denial of service via unspecified vectors. There are no reported fixed by versions.
VCID-wnjy-ggeb-eqcn
Aliases:
CVE-2017-10690
puppet: Environment leakage in puppet-agent There are no reported fixed by versions.
VCID-wucb-ckae-97aq
Aliases:
CVE-2018-10917
GHSA-574p-6fw4-4hw8
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') pulp 2.16.x and possibly older is vulnerable to an improper path parsing. A malicious user or a malicious iso feed repository can write to locations accessible to the 'apache' user. This may lead to overwrite of published content on other iso repositories. There are no reported fixed by versions.
VCID-xzbt-bkdp-8bgh
Aliases:
CVE-2016-1000346
GHSA-fjqm-246c-mwqg
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. There are no reported fixed by versions.
VCID-z6er-42pm-7ubq
Aliases:
CVE-2019-0231
GHSA-5h29-qq92-wj7f
Cleartext Transmission of Sensitive Information in Apache MINA Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA. There are no reported fixed by versions.
VCID-zkgb-14kz-33dz
Aliases:
CVE-2013-4347
GHSA-rv8h-p43r-4x5r
PYSEC-2014-86
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack. There are no reported fixed by versions.
VCID-zx5n-czhy-6qgu
Aliases:
CVE-2019-12387
GHSA-6cc5-2vg4-cc7m
PYSEC-2019-128
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:57:31.705039+00:00 RedHat Importer Affected by VCID-jau7-gfz8-dkfa https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3555.json 38.0.0
2026-04-01T14:55:46.635732+00:00 RedHat Importer Affected by VCID-w543-qxxs-f7g7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5382.json 38.0.0
2026-04-01T14:52:34.821166+00:00 RedHat Importer Affected by VCID-tbug-mv5x-uucb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4346.json 38.0.0
2026-04-01T14:51:34.757911+00:00 RedHat Importer Affected by VCID-zkgb-14kz-33dz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4347.json 38.0.0
2026-04-01T14:51:08.018579+00:00 RedHat Importer Affected by VCID-1mw1-384y-huc7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2099.json 38.0.0
2026-04-01T14:48:48.122628+00:00 RedHat Importer Affected by VCID-va8w-uzhc-x3bz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6668.json 38.0.0
2026-04-01T14:46:08.479447+00:00 RedHat Importer Affected by VCID-8wen-twwa-8khm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3653.json 38.0.0
2026-04-01T14:44:53.864768+00:00 RedHat Importer Affected by VCID-77c9-jb1m-6qe2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0203.json 38.0.0
2026-04-01T14:44:33.271396+00:00 RedHat Importer Affected by VCID-9gb8-xvrc-aqgb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0223.json 38.0.0
2026-04-01T14:44:27.398976+00:00 RedHat Importer Affected by VCID-vhxh-tpay-mbh3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0224.json 38.0.0
2026-04-01T14:43:26.236690+00:00 RedHat Importer Affected by VCID-jfqz-9a6e-jff7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2100.json 38.0.0
2026-04-01T14:43:21.679242+00:00 RedHat Importer Affected by VCID-fq2t-c2nv-23ce https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1609.json 38.0.0
2026-04-01T14:43:13.098810+00:00 RedHat Importer Affected by VCID-rc65-py17-kuhm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1816.json 38.0.0
2026-04-01T14:42:15.797785+00:00 RedHat Importer Affected by VCID-1yu9-avtx-cybv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1844.json 38.0.0
2026-04-01T14:41:24.359632+00:00 RedHat Importer Affected by VCID-7f1h-1fw8-k7c4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3155.json 38.0.0
2026-04-01T14:40:41.411421+00:00 RedHat Importer Affected by VCID-sqjb-qpyd-p7gn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3235.json 38.0.0
2026-04-01T14:40:37.908853+00:00 RedHat Importer Affected by VCID-3ycr-9smk-uqdc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3225.json 38.0.0
2026-04-01T14:40:14.723539+00:00 RedHat Importer Affected by VCID-5434-f6g7-8kdw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3208.json 38.0.0
2026-04-01T14:40:07.547784+00:00 RedHat Importer Affected by VCID-bysx-t7fz-5kdk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5245.json 38.0.0
2026-04-01T14:38:23.953995+00:00 RedHat Importer Affected by VCID-crf9-zn1q-vya8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6644.json 38.0.0
2026-04-01T14:38:11.196430+00:00 RedHat Importer Affected by VCID-mv26-fzn6-vycf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17718.json 38.0.0
2026-04-01T14:37:35.588097+00:00 RedHat Importer Affected by VCID-6xkf-evrx-pyau https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2166.json 38.0.0
2026-04-01T14:36:57.784802+00:00 RedHat Importer Affected by VCID-ka8b-44hx-mkc5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000352.json 38.0.0
2026-04-01T14:36:52.913004+00:00 RedHat Importer Affected by VCID-qr8s-5r61-skhw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000345.json 38.0.0
2026-04-01T14:36:48.018802+00:00 RedHat Importer Affected by VCID-f73y-mjrg-yfc9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000344.json 38.0.0
2026-04-01T14:35:18.719809+00:00 RedHat Importer Affected by VCID-wbgc-tuj3-47by https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6346.json 38.0.0
2026-04-01T14:34:11.033740+00:00 RedHat Importer Affected by VCID-jua2-2byr-t3cv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000338.json 38.0.0
2026-04-01T14:33:42.199935+00:00 RedHat Importer Affected by VCID-xzbt-bkdp-8bgh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000346.json 38.0.0
2026-04-01T14:32:45.399582+00:00 RedHat Importer Affected by VCID-6fxc-s6ht-x7ht https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10745.json 38.0.0
2026-04-01T14:32:01.785091+00:00 RedHat Importer Affected by VCID-2y5d-qg7z-2kdg https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5929.json 38.0.0
2026-04-01T14:31:17.410904+00:00 RedHat Importer Affected by VCID-bdms-nb18-guf9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7233.json 38.0.0
2026-04-01T14:29:03.542092+00:00 RedHat Importer Affected by VCID-8xgm-pabz-hkeg https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10689.json 38.0.0
2026-04-01T14:28:25.362043+00:00 RedHat Importer Affected by VCID-pd7m-bhqf-kkge https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7536.json 38.0.0
2026-04-01T14:27:33.407859+00:00 RedHat Importer Affected by VCID-mwus-fmc5-27f2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12175.json 38.0.0
2026-04-01T14:27:19.497853+00:00 RedHat Importer Affected by VCID-3t8t-yt9b-1fce https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10516.json 38.0.0
2026-04-01T14:27:15.944855+00:00 RedHat Importer Affected by VCID-am23-ncy4-27ck https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15100.json 38.0.0
2026-04-01T14:27:06.497318+00:00 RedHat Importer Affected by VCID-ceub-d4s9-dkcd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15095.json 38.0.0
2026-04-01T14:26:24.702943+00:00 RedHat Importer Affected by VCID-wnjy-ggeb-eqcn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10690.json 38.0.0
2026-04-01T14:26:16.025745+00:00 RedHat Importer Affected by VCID-27wt-wmzc-1bc2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6188.json 38.0.0
2026-04-01T14:26:13.151489+00:00 RedHat Importer Affected by VCID-3zeq-dyj1-8bdm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1097.json 38.0.0
2026-04-01T14:25:54.788775+00:00 RedHat Importer Affected by VCID-jae8-w85w-cyfu https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7537.json 38.0.0
2026-04-01T14:25:51.590877+00:00 RedHat Importer Affected by VCID-mv1p-yxvp-pbh6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7536.json 38.0.0
2026-04-01T14:25:42.633691+00:00 RedHat Importer Affected by VCID-sg6x-y34w-37bc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1090.json 38.0.0
2026-04-01T14:25:34.878294+00:00 RedHat Importer Affected by VCID-73c1-6ytd-ykf9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1096.json 38.0.0
2026-04-01T14:25:10.350771+00:00 RedHat Importer Affected by VCID-kwyu-yq4w-kqe4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10237.json 38.0.0
2026-04-01T14:24:22.650220+00:00 RedHat Importer Affected by VCID-tnen-a68v-9bfk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000343.json 38.0.0
2026-04-01T14:24:17.687727+00:00 RedHat Importer Affected by VCID-f4qa-9fn6-97az https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000342.json 38.0.0
2026-04-01T14:24:12.733820+00:00 RedHat Importer Affected by VCID-ddqw-aj7g-s7c2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000341.json 38.0.0
2026-04-01T14:24:07.734715+00:00 RedHat Importer Affected by VCID-jr7u-m7gc-pydy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000339.json 38.0.0
2026-04-01T14:24:02.685286+00:00 RedHat Importer Affected by VCID-31h9-7jrr-9kdt https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000340.json 38.0.0
2026-04-01T14:23:38.609480+00:00 RedHat Importer Affected by VCID-nmya-eyxd-9ybe https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000632.json 38.0.0
2026-04-01T14:22:40.232466+00:00 RedHat Importer Affected by VCID-wucb-ckae-97aq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10917.json 38.0.0
2026-04-01T14:22:30.464659+00:00 RedHat Importer Affected by VCID-rnuk-n3a6-cbh9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16861.json 38.0.0
2026-04-01T14:22:09.354137+00:00 RedHat Importer Affected by VCID-pyr1-73vu-93ej https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14664.json 38.0.0
2026-04-01T14:22:04.384732+00:00 RedHat Importer Affected by VCID-ftzy-9uny-byfb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16887.json 38.0.0
2026-04-01T14:21:39.397297+00:00 RedHat Importer Affected by VCID-sw69-1r7d-kkht https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16470.json 38.0.0
2026-04-01T14:20:32.955061+00:00 RedHat Importer Affected by VCID-6wxf-ewtr-z3hb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10906.json 38.0.0
2026-04-01T14:20:26.443382+00:00 RedHat Importer Affected by VCID-hmcs-7s53-mbft https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3893.json 38.0.0
2026-04-01T14:20:13.422071+00:00 RedHat Importer Affected by VCID-m29v-624x-kkha https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3891.json 38.0.0
2026-04-01T14:20:04.601426+00:00 RedHat Importer Affected by VCID-z6er-42pm-7ubq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0231.json 38.0.0
2026-04-01T14:19:37.968819+00:00 RedHat Importer Affected by VCID-9wej-f7zx-pfeq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12086.json 38.0.0
2026-04-01T14:18:59.543207+00:00 RedHat Importer Affected by VCID-zx5n-czhy-6qgu https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12387.json 38.0.0
2026-04-01T14:18:21.059197+00:00 RedHat Importer Affected by VCID-3af2-c1m7-3kdr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10198.json 38.0.0
2026-04-01T14:17:57.404102+00:00 RedHat Importer Affected by VCID-bsbd-bsbq-7qdk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14825.json 38.0.0
2026-04-01T14:17:05.035917+00:00 RedHat Importer Affected by VCID-bhq3-j6aj-1yae https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10086.json 38.0.0
2026-04-01T14:08:41.366957+00:00 RedHat Importer Affected by VCID-2g54-3acq-pbha https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10716.json 38.0.0