Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
enterprise_linux_server_supplementary_eus Vendor: redhat

About This Product

enterprise_linux_server_supplementary_eus is a software product offered by redhat. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 83 known vulnerabilities affecting redhat enterprise_linux_server_supplementary_eus. This includes 4 critical-severity issues and 46 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2014 to 2016, indicating a recent active security attention. 32 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-5895 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2013-5904 2014-01-15 2025-04-11 - 6.8 Likely
CVE-2013-5906 2014-01-15 2025-04-11 - 5.1 Unknown
CVE-2014-0382 2014-01-15 2025-04-11 - 4.3 Likely
CVE-2014-0418 2014-01-15 2025-04-11 - 5.1 Unknown
CVE-2013-5870 2014-01-15 2025-04-11 - 6.8 Likely
CVE-2014-3188 2014-10-08 2025-04-12 - 10.0 Likely
CVE-2014-3189 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-3190 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-3191 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-3192 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-3193 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-3194 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-3195 2014-10-08 2025-04-12 - 5.0 Likely
CVE-2014-3197 2014-10-08 2025-04-12 - 5.0 Likely
CVE-2014-3198 2014-10-08 2025-04-12 - 5.0 Likely
CVE-2014-3199 2014-10-08 2025-04-12 - 5.0 Likely
CVE-2014-3200 2014-10-08 2025-04-12 - 7.5 Likely
CVE-2014-7923 2015-01-22 2025-04-12 - 7.5 Likely
CVE-2014-7926 2015-01-22 2025-04-12 - 7.5 Likely
CVE-2014-7939 2015-01-22 2025-04-12 - 4.3 Likely
CVE-2014-7941 2015-01-22 2025-04-12 - 5.0 Likely
CVE-2014-7942 2015-01-22 2025-04-12 - 7.5 Likely
CVE-2014-7943 2015-01-22 2025-04-12 - 5.0 Likely
CVE-2015-1214 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1215 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1216 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1217 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1218 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1219 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1220 2015-03-09 2025-04-12 - 6.8 Likely
CVE-2015-1228 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1229 2015-03-09 2025-04-12 - 5.0 Likely
CVE-2015-1230 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-1231 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2015-0346 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0347 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0348 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0349 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0350 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0351 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0352 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0353 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0354 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0355 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0358 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-0360 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-3038 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-3039 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-3040 2015-04-14 2025-04-12 - 5.0 Likely
CVE-2015-3041 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-3042 2015-04-14 2025-04-12 - 10.0 Likely
CVE-2015-3044 2015-04-14 2025-04-12 - 5.0 Likely
CVE-2015-1243 2015-05-01 2025-04-12 - 7.5 Likely
CVE-2015-1250 2015-05-01 2025-04-12 - 7.5 Likely
CVE-2015-1270 2015-07-23 2025-04-12 - 6.8 Likely
CVE-2015-1271 2015-07-23 2025-04-12 - 6.8 Likely
CVE-2015-1272 2015-07-23 2025-04-12 - 7.5 Likely
CVE-2015-1273 2015-07-23 2025-04-12 - 6.8 Likely
CVE-2015-1276 2015-07-23 2025-04-12 9.8 7.5 Likely
CVE-2015-1277 2015-07-23 2025-04-12 - 7.5 Likely
CVE-2015-1278 2015-07-23 2025-04-12 - 4.3 Likely
CVE-2015-1279 2015-07-23 2025-04-12 - 7.5 Likely
CVE-2015-1280 2015-07-23 2025-04-12 - 7.5 Likely
CVE-2015-1281 2015-07-23 2025-04-12 - 4.3 Likely
CVE-2015-1282 2015-07-23 2025-04-12 - 6.8 Likely
CVE-2015-1285 2015-07-23 2025-04-12 - 5.0 Likely
CVE-2015-1286 2015-07-23 2025-04-12 - 4.3 Likely
CVE-2015-1287 2015-07-23 2025-04-12 - 4.3 Likely
CVE-2015-1288 2015-07-23 2025-04-12 - 6.8 Likely
CVE-2015-1289 2015-07-23 2025-04-12 - 7.5 Likely
CVE-2016-2051 2016-01-25 2025-04-12 9.8 6.8 Likely
CVE-2016-3715 2016-05-05 2025-10-22 5.5 5.8 Likely
CVE-2016-3716 2016-05-05 2025-04-12 3.3 4.3 Likely
CVE-2016-3717 2016-05-05 2025-04-12 5.5 7.1 Likely
CVE-2016-3718 2016-05-05 2025-10-22 5.5 4.3 Likely
CVE-2016-1660 2016-05-14 2025-04-12 8.8 6.8 Likely
CVE-2016-1661 2016-05-14 2025-04-12 8.0 8.3 Likely
CVE-2016-1662 2016-05-14 2025-04-12 9.8 10.0 Likely
CVE-2016-1663 2016-05-14 2025-04-12 8.8 6.8 Likely
CVE-2016-1664 2016-05-14 2025-04-12 4.3 4.3 Likely
CVE-2016-1665 2016-05-14 2025-04-12 6.5 4.3 Likely
CVE-2016-1666 2016-05-14 2025-04-12 9.8 7.5 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat enterprise_linux_server_supplementary_eus by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.