Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
enterprise_linux_hpc_node_eus Vendor: redhat

About This Product

enterprise_linux_hpc_node_eus is a software product offered by redhat. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 83 known vulnerabilities affecting redhat enterprise_linux_hpc_node_eus. This includes 7 critical-severity issues and 38 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2015 to 2017, indicating a recent active security attention. 32 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-9657 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9658 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9660 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9661 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9663 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9664 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9666 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9667 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9669 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9670 2015-02-08 2025-04-12 - 4.3 Likely
CVE-2014-9671 2015-02-08 2025-04-12 - 4.3 Likely
CVE-2014-9673 2015-02-08 2025-04-12 - 6.8 Likely
CVE-2014-9674 2015-02-08 2025-04-12 - 7.5 Likely
CVE-2014-9675 2015-02-08 2025-04-12 - 5.0 Likely
CVE-2015-2301 2015-03-30 2025-04-12 - 7.5 Likely
CVE-2015-2348 2015-03-30 2025-04-12 - 5.0 Likely
CVE-2015-2787 2015-03-30 2025-04-12 - 7.5 Likely
CVE-2015-1863 2015-04-28 2025-04-12 - 5.8 Unknown
CVE-2015-2783 2015-06-09 2025-04-12 - 5.8 Likely
CVE-2015-3307 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-3329 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-3330 2015-06-09 2025-04-12 - 6.8 Likely
CVE-2015-4021 2015-06-09 2025-04-12 - 5.0 Likely
CVE-2015-4022 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4024 2015-06-09 2025-04-12 - 5.0 Likely
CVE-2015-4025 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4026 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4147 2015-06-09 2025-04-12 - 7.5 Likely
CVE-2015-4148 2015-06-09 2025-04-12 - 5.0 Likely
CVE-2015-4819 2015-10-21 2025-04-12 - 7.2 Unknown
CVE-2015-7981 2015-11-24 2025-04-12 - 5.0 Likely
CVE-2016-0505 2016-01-21 2025-04-12 - 6.8 Likely
CVE-2016-0546 2016-01-21 2025-04-12 - 7.2 Unknown
CVE-2016-0596 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2016-0597 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2016-0598 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0600 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0606 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0608 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2016-0609 2016-01-21 2025-04-12 - 1.7 Unknown
CVE-2016-0616 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2015-7547 2016-02-18 2025-04-12 8.1 6.8 Likely
CVE-2015-5229 2016-04-08 2025-04-12 7.5 5.0 Likely
CVE-2016-3068 2016-04-13 2025-04-12 8.8 6.8 Likely
CVE-2016-3069 2016-04-13 2025-04-12 8.8 6.8 Likely
CVE-2016-0695 2016-04-21 2025-04-12 5.9 2.6 Unknown
CVE-2016-2105 2016-05-05 2025-04-12 7.5 5.0 Likely
CVE-2016-2106 2016-05-05 2025-04-12 7.5 5.0 Likely
CVE-2016-2107 2016-05-05 2025-04-12 5.9 2.6 Unknown
CVE-2016-2108 2016-05-05 2025-04-12 9.8 10.0 Likely
CVE-2016-2109 2016-05-05 2025-04-12 7.5 7.8 Likely
CVE-2016-3715 2016-05-05 2025-10-22 5.5 5.8 Likely
CVE-2016-3716 2016-05-05 2025-04-12 3.3 4.3 Likely
CVE-2016-3717 2016-05-05 2025-04-12 5.5 7.1 Likely
CVE-2016-3718 2016-05-05 2025-10-22 5.5 4.3 Likely
CVE-2015-3411 2016-05-16 2025-04-12 6.5 6.4 Likely
CVE-2015-3412 2016-05-16 2025-04-12 5.3 5.0 Likely
CVE-2015-4598 2016-05-16 2025-04-12 6.5 7.5 Likely
CVE-2015-4599 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4600 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4601 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4602 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4603 2016-05-16 2025-04-12 9.8 10.0 Likely
CVE-2015-4604 2016-05-16 2025-04-12 7.5 5.0 Likely
CVE-2015-4605 2016-05-16 2025-04-12 7.5 5.0 Likely
CVE-2015-5260 2016-06-07 2025-04-12 7.8 7.2 Unknown
CVE-2015-5261 2016-06-07 2025-04-12 7.1 3.6 Unknown
CVE-2016-0749 2016-06-09 2025-04-12 9.8 10.0 Likely
CVE-2016-2150 2016-06-09 2025-04-12 7.1 3.6 Unknown
CVE-2016-3698 2016-06-13 2025-04-12 8.1 6.8 Likely
CVE-2016-0758 2016-06-27 2025-04-12 7.8 7.2 Unknown
CVE-2016-4470 2016-06-27 2025-04-12 5.5 4.9 Unknown
CVE-2016-5388 2016-07-19 2025-04-12 8.1 5.1 Unknown
CVE-2016-4300 2016-09-21 2025-04-12 7.8 6.8 Likely
CVE-2016-4302 2016-09-21 2025-04-12 7.8 6.8 Likely
CVE-2016-4809 2016-09-21 2025-04-12 7.5 5.0 Likely
CVE-2016-5418 2016-09-21 2025-04-12 7.5 5.0 Likely
CVE-2016-5844 2016-09-21 2025-04-12 6.5 4.3 Likely
CVE-2016-7166 2016-09-21 2025-04-12 5.5 4.3 Likely
CVE-2016-6325 2016-10-13 2025-04-12 7.8 7.2 Unknown
CVE-2015-3315 2017-06-26 2025-04-20 7.8 7.2 Unknown
CVE-2015-5300 2017-07-21 2025-04-20 7.5 5.0 Likely
CVE-2015-3149 2017-07-25 2025-04-20 5.5 2.1 Unknown

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat enterprise_linux_hpc_node_eus by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.