Vulnerability Name: CVE-2008-0455 (CCN-39867) Assigned: 2008-01-25 Published: 2008-01-25 Updated: 2021-06-06 Summary: Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
2.6 Low (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N )2.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-79 Vulnerability Consequences: Gain Access References: Source: CCN Type: Apache Web siteApache Source: CCN Type: Gentoo Bugzilla Bug 209899www-servers/apache mod_negotiation XSS and CRLF injection (CVE-2008-{0455,0456}) Source: MITRE Type: CNACVE-2008-0455 Source: CCN Type: RHSA-2012-1591Important: JBoss Enterprise Application Platform 6.0.1 update Source: REDHAT Type: UNKNOWNRHSA-2012:1591 Source: CCN Type: RHSA-2012-1592Important: JBoss Enterprise Application Platform 6.0.1 update Source: REDHAT Type: UNKNOWNRHSA-2012:1592 Source: CCN Type: RHSA-2012-1594Important: JBoss Enterprise Application Platform 6.0.1 update Source: REDHAT Type: UNKNOWNRHSA-2012:1594 Source: CCN Type: RHSA-2013-0130Low: httpd security, bug fix, and enhancement update Source: REDHAT Type: UNKNOWNRHSA-2013:0130 Source: CCN Type: RHSA-2013-0512Low: httpd security, bug fix, and enhancement update Source: CCN Type: Full-Disclosure Mailing List, Tue, 22 Jan 2008 23:16:09 +0100Apache mod_negotiation Xss and Http Response Splitting Source: SECUNIA Type: UNKNOWN29348 Source: SECUNIA Type: UNKNOWN51607 Source: GENTOO Type: UNKNOWNGLSA-200803-19 Source: SREASON Type: UNKNOWN3575 Source: CCN Type: SECTRACK ID: 1019256Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks Source: SECTRACK Type: Exploit1019256 Source: CCN Type: GLSA-200803-19Apache: Multiple vulnerabilities Source: MISC Type: Exploithttp://www.mindedsecurity.com/MSA01150108.html Source: CCN Type: OSVDB ID: 41019Apache HTTP Server mod_negotiation Module Multi-Line Filename Upload XSS Source: BUGTRAQ Type: UNKNOWN20080122 Apache mod_negotiation Xss and Http Response Splitting Source: BID Type: Exploit27409 Source: CCN Type: BID-27409Apache 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability Source: XF Type: UNKNOWNapache-modnegotiation-xss(39867) Source: XF Type: UNKNOWNapache-modnegotiation-xss(39867) Source: MLIST Type: UNKNOWN[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/ Source: MLIST Type: UNKNOWN[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Vulnerable Configuration: Configuration 1 :cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.33:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.34:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.28:beta:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.50:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.51:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.59:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.60:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.6:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.18:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.27:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.28:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.35:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.52:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.53:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.61:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.31:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.32:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.48:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.49:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.56:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.58:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.4:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:-:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.29:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.39:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.47:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.54:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.55:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.2:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:http_server:2.0.28:beta:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.47:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.60:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.49:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.48:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.51:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.33:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.52:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.59:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.4:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.55:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.6:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.39:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.35:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.34:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.32:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.31:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.30:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.38:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.32:beta:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.34:beta:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.50:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.53:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.54:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.56:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.57:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.58:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.60:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.61:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.2.1:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/a:redhat:rhel_application_server:2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20080455 V CVE-2008-0455 2015-11-16 oval:org.mitre.oval:def:23042 P ELSA-2013:0130: httpd security, bug fix, and enhancement update (Low) 2014-05-26 oval:org.mitre.oval:def:23943 P ELSA-2013:0512: httpd security, bug fix, and enhancement update (Low) 2014-05-26 oval:org.mitre.oval:def:21017 P RHSA-2013:0130: httpd security, bug fix, and enhancement update (Low) 2014-02-17 oval:org.mitre.oval:def:21066 P RHSA-2013:0512: httpd security, bug fix, and enhancement update (Low) 2014-02-17 oval:com.redhat.rhsa:def:20130512 P RHSA-2013:0512: httpd security, bug fix, and enhancement update (Low) 2013-02-21 oval:com.redhat.rhsa:def:20130130 P RHSA-2013:0130: httpd security, bug fix, and enhancement update (Low) 2013-01-08
BACK
apache http server 1.3.12
apache http server 1.3.14
apache http server 1.3.24
apache http server 1.3.25
apache http server 1.3.33
apache http server 1.3.34
apache http server 2.0.28 beta
apache http server 2.0.32
apache http server 2.0.41
apache http server 2.0.42
apache http server 2.0.43
apache http server 2.0.50
apache http server 2.0.51
apache http server 2.0.59
apache http server 2.0.60
apache http server 2.2.6
apache http server 1.3.17
apache http server 1.3.18
apache http server 1.3.26
apache http server 1.3.27
apache http server 1.3.28
apache http server 1.3.35
apache http server 1.3.36
apache http server 2.0.35
apache http server 2.0.36
apache http server 2.0.44
apache http server 2.0.45
apache http server 2.0.52
apache http server 2.0.53
apache http server 2.0.61
apache http server 2.0.9
apache http server 1.3.1
apache http server 1.3.11
apache http server 1.3.22
apache http server 1.3.23
apache http server 1.3.31
apache http server 1.3.32
apache http server 2.0
apache http server 2.0.28
apache http server 2.0.39
apache http server 2.0.40
apache http server 2.0.48
apache http server 2.0.49
apache http server 2.0.56
apache http server 2.0.58
apache http server 2.2.3
apache http server 2.2.4
apache http server -
apache http server 1.3
apache http server 1.3.19
apache http server 1.3.20
apache http server 1.3.29
apache http server 1.3.3
apache http server 1.3.37
apache http server 1.3.39
apache http server 2.0.37
apache http server 2.0.38
apache http server 2.0.46
apache http server 2.0.47
apache http server 2.0.54
apache http server 2.0.55
apache http server 2.2.0
apache http server 2.2.2
apache http server 2.0.28 beta
apache http server 2.0
apache http server 2.0.38
apache http server 2.0.39
apache http server 2.0.42
apache http server 2.0.47
apache http server 2.0.60
apache http server 2.0.49
apache http server 2.0.48
apache http server 2.0.51
apache http server 1.3.33
apache http server 2.0.52
apache http server 2.0.40
apache http server 1.3.37
apache http server 2.0.59
apache http server 2.2.4
apache http server 2.0.46
apache http server 2.0.55
apache http server 2.2.3
apache http server 2.2.0
apache http server 2.2.2
apache http server 2.2.6
apache http server 1.3.39
apache http server 1.3.3
apache http server 1.3.36
apache http server 1.3.35
apache http server 1.3.34
apache http server 1.3.32
apache http server 1.3.31
apache http server 2.0.28
apache http server 2.0.32
apache http server 2.0.35
apache http server 2.0.36
apache http server 2.0.37
apache http server 2.0.41
apache http server 1.3.30
apache http server 1.3.38
apache http server 2.0.32 beta
apache http server 2.0.34 beta
apache http server 2.0.43
apache http server 2.0.44
apache http server 2.0.45
apache http server 2.0.50
apache http server 2.0.53
apache http server 2.0.54
apache http server 2.0.56
apache http server 2.0.57
apache http server 2.0.58
apache http server 2.0.60
apache http server 2.0.61
apache http server 2.2
apache http server 2.2.1
gentoo linux *
redhat enterprise linux 3
redhat enterprise linux 5
redhat enterprise linux 5
redhat enterprise linux 5
redhat rhel application server 2
redhat enterprise linux 6
redhat enterprise linux 6
redhat enterprise linux desktop 6
redhat enterprise linux hpc node 6