Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Satellite 6.16 for RHEL 8 | 0:0.13.0-0.1.el8sat ~ * | cpe:/a:redhat:satellite:6.16::el8 | |
| Red Hat | Red Hat Satellite 6.16 for RHEL 8 | 0:0.13.0-0.1.el8sat ~ * | cpe:/a:redhat:satellite:6.16::el8 | |
| Red Hat | Red Hat Satellite 6.16 for RHEL 9 | 0:0.13.0-0.1.el9sat ~ * | cpe:/a:redhat:satellite:6.16::el8 | |
| Red Hat | Red Hat Satellite 6.16 for RHEL 9 | 0:0.13.0-0.1.el9sat ~ * | cpe:/a:redhat:satellite:6.16::el8 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:3.14.0.14-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.1.23-0.3.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:1.2.0-0.1.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:4.2.28-0.1.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:2.22.3-1.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:3.27.10-2.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:1.5.1-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.4.3-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:4.16.0.14-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.13.0-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:6.17.7-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.0.3-4.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:3.14.0.14-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.1.23-0.3.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:1.2.0-0.1.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:4.2.28-0.1.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:2.22.3-1.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:3.27.10-2.el9pc ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:1.5.1-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.4.3-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:4.16.0.14-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.13.0-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:6.17.7-1.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.17 for RHEL 9 | 0:0.0.3-4.el9sat ~ * | cpe:/a:redhat:satellite_maintenance:6.17::el9 | |
| Red Hat | Red Hat Satellite 6.18 for RHEL 9 | 0:0.13.0-1.el9sat ~ * | cpe:/a:redhat:satellite:6.18::el9 | |
| Red Hat | Red Hat Satellite 6.18 for RHEL 9 | 0:0.13.0-1.el9sat ~ * | cpe:/a:redhat:satellite:6.18::el9 | |
| Red Hat | Red Hat Satellite 6 | - | cpe:/a:redhat:satellite:6 |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-9909 | 6.7 MEDIUM | Aap-gateway: improper path validation in gateway allows credential exfiltration |
| CVE-2025-9908 | 6.7 MEDIUM | Event-driven-ansible: sensitive internal headers disclosure in aap eda event streams |
| CVE-2025-9907 | 6.7 MEDIUM | Event-driven-ansible: event stream test mode exposes sensitive headers in aap eda |
| CVE-2026-0871 | 4.9 MEDIUM | Org.keycloak/keycloak-services: keycloak: unauthorized modification of unmanaged user attr |
No comments yet