Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
enterprise_linux_hpc_node Vendor: redhat

About This Product

enterprise_linux_hpc_node is a software product offered by redhat. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 149 known vulnerabilities affecting redhat enterprise_linux_hpc_node. This includes 13 critical-severity issues and 62 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2012 to 2017, indicating a recent active security attention. 63 medium-severity issues and 11 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-1703 2012-05-03 2025-04-11 - 6.8 Likely
CVE-2012-0867 2012-07-18 2025-04-11 - 4.3 Likely
CVE-2012-5689 2013-01-25 2025-04-11 - 7.1 Likely
CVE-2012-6137 2013-05-21 2025-04-11 - 4.3 Likely
CVE-2014-4342 2014-07-20 2025-04-12 - 5.0 Likely
CVE-2014-4343 2014-08-14 2025-04-12 - 7.6 Unknown
CVE-2014-4344 2014-08-14 2025-04-12 - 7.8 Likely
CVE-2014-3528 2014-08-19 2025-04-12 - 4.0 Unknown
CVE-2014-7145 2014-09-28 2025-04-12 - 7.8 Likely
CVE-2014-3640 2014-11-07 2025-04-12 - 2.1 Unknown
CVE-2014-8564 2014-11-13 2025-04-12 - 5.0 Likely
CVE-2014-4975 2014-11-15 2025-04-12 - 5.0 Likely
CVE-2012-6662 2014-11-24 2025-04-12 - 4.3 Likely
CVE-2014-9273 2014-12-08 2025-04-12 - 4.6 Unknown
CVE-2014-3580 2014-12-18 2025-04-12 - 5.0 Likely
CVE-2014-8108 2014-12-18 2025-04-12 - 5.0 Likely
CVE-2014-8136 2014-12-19 2025-04-12 - 2.1 Unknown
CVE-2014-7300 2014-12-25 2025-04-12 - 7.2 Unknown
CVE-2015-0432 2015-01-21 2025-04-12 - 4.0 Likely
CVE-2015-0236 2015-01-29 2025-04-12 - 3.5 Unknown
CVE-2014-9657 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9658 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9660 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9661 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9663 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9664 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9666 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9667 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9669 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9670 2015-02-08 2025-04-12 - 4.3 Likely
CVE-2014-9671 2015-02-08 2025-04-12 - 4.3 Likely
CVE-2014-9673 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9674 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9675 2015-02-08 2025-04-12 - 5.0 Likely
CVE-2014-8169 2015-03-18 2025-04-12 - 4.4 Unknown
CVE-2015-2301 2015-03-30 2025-04-12 - 7.5 Likely
CVE-2015-2348 2015-03-30 2025-04-12 - 5.0 Likely
CVE-2015-2787 2015-03-30 2025-04-12 - 7.5 Likely
CVE-2015-0248 2015-04-08 2025-04-12 - 5.0 Likely
CVE-2015-0251 2015-04-08 2025-04-12 - 4.0 Likely
CVE-2015-1863 2015-04-28 2025-04-12 - 5.8 Unknown
CVE-2015-2783 2015-06-09 2025-04-12 - 5.8 Likely
CVE-2015-3307 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-3329 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-3330 2015-06-09 2025-04-12 - 6.8 Likely
CVE-2015-4021 2015-06-09 2025-04-12 - 5.0 Likely
CVE-2015-4022 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4024 2015-06-09 2025-04-12 - 5.0 Likely
CVE-2015-4025 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4026 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4147 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4148 2015-06-09 2025-04-12 - 5.0 Likely
CVE-2015-4142 2015-06-15 2025-04-12 - 4.3 Likely
CVE-2015-5157 2015-08-31 2025-04-12 - 7.2 Unknown
CVE-2015-3247 2015-09-08 2025-04-12 - 6.9 Unknown
CVE-2015-5234 2015-10-09 2025-04-12 - 6.8 Likely
CVE-2015-5235 2015-10-09 2025-04-12 - 4.3 Likely
CVE-2015-4819 2015-10-21 2025-04-12 - 7.2 Unknown
CVE-2015-7981 2015-11-24 2025-04-12 - 5.0 Likely
CVE-2015-5273 2015-12-07 2025-04-12 - 3.6 Unknown
CVE-2015-5287 2015-12-07 2025-04-12 - 6.9 Unknown
CVE-2015-3276 2015-12-07 2025-04-12 7.5 5.0 Likely
CVE-2015-5312 2015-12-15 2025-04-12 - 7.1 Likely
CVE-2015-7497 2015-12-15 2025-04-12 - 5.0 Likely
CVE-2015-7498 2015-12-15 2025-04-12 - 5.0 Likely
CVE-2015-7499 2015-12-15 2025-04-12 - 5.0 Likely
CVE-2015-7500 2015-12-15 2025-04-12 - 5.0 Likely
CVE-2015-8241 2015-12-15 2025-04-12 - 6.4 Likely
CVE-2015-8242 2015-12-15 2025-04-12 - 5.8 Likely
CVE-2015-8317 2015-12-15 2025-04-12 - 5.0 Likely
CVE-2015-5277 2015-12-17 2025-04-12 - 7.2 Unknown
CVE-2015-8327 2015-12-17 2025-04-12 - 7.5 Likely
CVE-2016-0505 2016-01-21 2025-04-12 - 6.8 Likely
CVE-2016-0546 2016-01-21 2025-04-12 - 7.2 Unknown
CVE-2016-0596 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2016-0597 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2016-0598 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0600 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0606 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0608 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0609 2016-01-21 2025-04-12 - 1.7 Unknown
CVE-2016-0616 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2015-7547 2016-02-18 2025-04-12 8.1 6.8 Likely
CVE-2016-0636 2016-03-24 2025-04-12 8.1 9.3 Likely
CVE-2015-5229 2016-04-08 2025-04-12 7.5 5.0 Likely
CVE-2016-3068 2016-04-13 2025-04-12 8.8 6.8 Likely
CVE-2016-3069 2016-04-13 2025-04-12 8.8 6.8 Likely
CVE-2015-8540 2016-04-14 2025-04-12 8.8 9.3 Likely
CVE-2010-5325 2016-04-15 2025-04-12 9.8 7.5 Likely
CVE-2016-0741 2016-04-19 2025-04-12 7.5 7.8 Likely
CVE-2016-0695 2016-04-21 2025-04-12 5.9 2.6 Unknown
CVE-2016-2105 2016-05-05 2025-04-12 7.5 5.0 Likely
CVE-2016-2106 2016-05-05 2025-04-12 7.5 5.0 Likely
CVE-2016-2107 2016-05-05 2025-04-12 5.9 2.6 Unknown
CVE-2016-2108 2016-05-05 2025-04-12 9.8 10.0 Likely
CVE-2016-2109 2016-05-05 2025-04-12 7.5 7.8 Likely
CVE-2016-3715 2016-05-05 2025-10-22 5.5 5.8 Likely
CVE-2016-3716 2016-05-05 2025-04-12 3.3 4.3 Likely
CVE-2016-3717 2016-05-05 2025-04-12 5.5 7.1 Likely
CVE-2016-3718 2016-05-05 2025-10-22 5.5 4.3 Likely
CVE-2015-3411 2016-05-16 2025-04-12 6.5 6.4 Likely
CVE-2015-3412 2016-05-16 2025-04-12 5.3 5.0 Likely
CVE-2015-4598 2016-05-16 2025-04-12 6.5 7.5 Likely
CVE-2015-4599 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4600 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4601 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4602 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4603 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4604 2016-05-16 2025-04-12 7.5 5.0 Likely
CVE-2015-4605 2016-05-16 2025-04-12 7.5 5.0 Likely
CVE-2015-5260 2016-06-07 2025-04-12 7.8 7.2 Unknown
CVE-2015-5261 2016-06-07 2025-04-12 7.1 3.6 Unknown
CVE-2016-3698 2016-06-13 2025-04-12 8.1 6.8 Likely
CVE-2016-0758 2016-06-27 2025-04-12 7.8 7.2 Unknown
CVE-2016-4470 2016-06-27 2025-04-12 5.5 4.9 Unknown
CVE-2016-5388 2016-07-19 2025-04-12 8.1 5.1 Unknown
CVE-2016-4300 2016-09-21 2025-04-12 7.8 6.8 Likely
CVE-2016-4302 2016-09-21 2025-04-12 7.8 6.8 Likely
CVE-2016-4809 2016-09-21 2025-04-12 7.5 5.0 Likely
CVE-2016-5418 2016-09-21 2025-04-12 7.5 5.0 Likely
CVE-2016-5844 2016-09-21 2025-04-12 6.5 4.3 Likely
CVE-2016-7166 2016-09-21 2025-04-12 5.5 4.3 Likely
CVE-2016-6325 2016-10-13 2025-04-12 7.8 7.2 Unknown
CVE-2016-7796 2016-10-13 2025-04-12 5.5 4.9 Unknown
CVE-2014-8241 2016-12-14 2025-04-12 9.8 7.5 Likely
CVE-2016-7091 2016-12-22 2025-04-12 4.4 4.9 Unknown
CVE-2016-7545 2017-01-19 2025-04-20 8.8 7.2 Unknown
CVE-2016-9634 2017-01-27 2025-04-20 9.8 7.5 Likely
CVE-2016-9635 2017-01-27 2025-04-20 9.8 7.5 Likely
CVE-2016-9636 2017-01-27 2025-04-20 9.8 7.5 Likely
CVE-2016-4444 2017-04-11 2025-04-20 7.0 6.9 Unknown
CVE-2016-4445 2017-04-11 2025-04-20 7.0 6.9 Unknown
CVE-2016-4446 2017-04-11 2025-04-20 7.0 6.9 Unknown
CVE-2016-4989 2017-04-11 2025-04-20 7.0 6.9 Unknown
CVE-2016-4455 2017-04-14 2025-04-20 3.3 2.1 Unknown
CVE-2016-6489 2017-04-14 2025-04-20 7.5 5.0 Likely
CVE-2016-5410 2017-04-19 2025-04-20 5.5 2.1 Unknown
CVE-2016-3099 2017-06-08 2025-04-20 7.5 5.0 Likely
CVE-2016-4992 2017-06-08 2025-04-20 7.5 5.0 Likely
CVE-2016-5405 2017-06-08 2025-04-20 9.8 5.0 Likely
CVE-2016-5416 2017-06-08 2025-04-20 7.5 5.0 Likely
CVE-2016-7050 2017-06-08 2025-04-20 9.8 7.5 Likely
CVE-2015-3315 2017-06-26 2025-04-20 7.8 7.2 Unknown
CVE-2016-0764 2017-07-17 2025-04-20 6.2 2.1 Unknown
CVE-2015-5194 2017-07-21 2025-04-20 7.5 5.0 Likely
CVE-2015-5195 2017-07-21 2025-04-20 7.5 5.0 Likely
CVE-2015-5219 2017-07-21 2025-04-20 7.5 5.0 Likely
CVE-2015-5300 2017-07-21 2025-04-20 7.5 5.0 Likely
CVE-2015-3149 2017-07-25 2025-04-20 5.5 2.1 Unknown

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat enterprise_linux_hpc_node by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.