Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
enterprise_linux_aus Vendor: redhat

About This Product

enterprise_linux_aus is a software product offered by redhat. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 45 known vulnerabilities affecting redhat enterprise_linux_aus. This includes 3 critical-severity issues and 20 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2011 to 2024, indicating a sustained research interest and ongoing security attention. 18 medium-severity issues and 4 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2011-1593 2011-05-03 2025-04-11 - 4.9 Unknown
CVE-2011-1745 2011-05-09 2025-04-11 - 6.9 Unknown
CVE-2011-1746 2011-05-09 2025-04-11 - 6.9 Unknown
CVE-2011-2022 2011-05-09 2025-04-11 - 6.9 Unknown
CVE-2011-1093 2011-07-18 2025-04-11 - 7.8 Likely
CVE-2011-2492 2011-07-28 2025-04-11 - 1.9 Unknown
CVE-2011-2213 2011-08-29 2025-04-11 - 4.9 Unknown
CVE-2012-0260 2012-06-05 2025-04-11 6.5 4.3 Likely
CVE-2013-0772 2013-02-19 2025-04-11 - 5.8 Likely
CVE-2013-0775 2013-02-19 2025-04-11 - 9.3 Likely
CVE-2013-0776 2013-02-19 2025-04-11 - 4.0 Unknown
CVE-2013-0780 2013-02-19 2025-04-11 - 9.3 Likely
CVE-2013-0782 2013-02-19 2025-04-11 - 9.3 Likely
CVE-2013-0783 2013-02-19 2025-04-11 - 9.3 Likely
CVE-2011-1182 2013-03-01 2025-04-11 - 3.6 Unknown
CVE-2014-9584 2015-01-09 2025-04-12 - 2.1 Unknown
CVE-2014-9585 2015-01-09 2025-04-12 - 2.1 Unknown
CVE-2016-5195 2016-11-10 2025-11-04 7.0 7.2 Unknown
CVE-2017-10661 2017-08-19 2025-04-20 7.0 7.6 Unknown
CVE-2018-1049 2018-02-16 2024-11-21 5.9 4.3 Likely
CVE-2016-9901 2018-06-11 2025-11-25 9.8 7.5 Likely
CVE-2017-7824 2018-06-11 2025-11-25 9.8 7.5 Likely
CVE-2017-7829 2018-06-11 2024-11-21 5.3 5.0 Likely
CVE-2017-7847 2018-06-11 2024-11-21 4.3 4.3 Likely
CVE-2018-13405 2018-07-06 2024-11-21 7.8 4.6 Unknown
CVE-2018-14638 2018-09-14 2024-11-21 7.5 5.0 Likely
CVE-2018-16878 2019-04-18 2024-11-21 5.5 2.1 Unknown
CVE-2019-11811 2019-05-07 2024-11-21 7.0 6.9 Unknown
CVE-2019-10126 2019-06-14 2024-11-21 9.8 7.5 Likely
CVE-2019-11477 2019-06-19 2024-11-21 7.5 7.8 Likely
CVE-2019-11478 2019-06-19 2024-11-21 5.3 5.0 Likely
CVE-2019-9506 2019-08-14 2024-11-21 8.1 4.8 Unknown
CVE-2020-10711 2020-05-22 2024-11-21 5.9 4.3 Likely
CVE-2020-1045 2020-09-11 2026-02-23 7.5 5.0 Likely
CVE-2020-14355 2020-10-07 2024-11-21 6.6 6.5 Likely
CVE-2020-14391 2021-02-08 2024-11-21 5.5 2.1 Unknown
CVE-2021-3570 2021-07-09 2024-11-21 8.8 8.0 Likely
CVE-2021-3609 2022-03-03 2024-11-21 7.0 6.9 Unknown
CVE-2021-20316 2022-08-23 2024-11-21 6.8 - -
CVE-2021-3669 2022-08-26 2025-11-03 5.5 - -
CVE-2023-0494 2023-03-27 2025-02-24 7.8 - -
CVE-2023-3972 2023-11-01 2024-11-21 7.8 - -
CVE-2023-47038 2023-12-18 2025-11-04 7.0 - -
CVE-2024-0229 2024-02-09 2025-11-04 7.8 - -
CVE-2024-3183 2024-06-12 2024-11-21 8.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat enterprise_linux_aus by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.