Red Hat Enterprise Linux Extended Update Support (EUS) 4.5

CPE Details

Red Hat Enterprise Linux Extended Update Support (EUS) 4.5
4.5
2020-10-29
15h48 +00:00
2020-10-29
15h48 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

enterprise_linux_eus

Version

4.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2006-5752 2007-06-27 15h00 +00:00 Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
4.3
CVE-2007-1349 2007-03-29 22h00 +00:00 PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
5
CVE-2006-5158 2006-10-03 21h00 +00:00 The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.
7.5
High