Dataset Viewer
Auto-converted to Parquet
cve
stringlengths
13
16
cwe
stringclasses
476 values
affected_component
stringlengths
0
256
summary
stringlengths
0
246
severity
stringclasses
5 values
cvss_v2
stringclasses
250 values
cvss_v3
stringlengths
37
48
description
stringlengths
20
4k
statement
stringlengths
31
2.49k
discovery_date
stringlengths
25
32
release_date
stringlengths
25
32
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
602
known_not_affected_products
sequencelengths
0
30.2k
under_investigation_products
sequencelengths
0
78
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
217
remediation_details
sequencelengths
0
217
remediation_dates
sequencelengths
0
217
CVE-2025-0749
null
Homey <= 2.4.3 - Limited Authentication Bypass due to Missing Empty Value Check
null
null
null
The Homey theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.3. This is due to the 'verification_id' value being set to empty, and the not empty check is missing in the dashboard user profile page. This makes it possible for unauthenticated attackers to log in to the first verified user.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-2324
null
A MOVEit Transfer user configured as a Shared Account can gain unintended List permissions on a folder
null
null
null
Improper Privilege Management vulnerability for users configured as Shared Accounts in Progress MOVEit Transfer (SFTP module) allows Privilege Escalation.This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.12, from 2024.0.0 before 2024.0.8, from 2024.1.0 before 2024.1.2.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21608
null
Forged packets over MQTT can show up in direct messages in Meshtastic firmware
null
null
null
Meshtastic is an open source mesh networking solution. In affected firmware versions crafted packets over MQTT are able to appear as a DM in client to a node even though they were not decoded with PKC. This issue has been addressed in version 2.5.19 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23635
null
WordPress ePermissions plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mobde3net ePermissions allows Reflected XSS. This issue affects ePermissions: from n/a through 1.2.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-24959
CWE-94
zx
Environment Variable Injection for dotenv API in zx
None
null
0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N
zx is a tool for writing better scripts. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to arbitrary command execution or unexpected behavior in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly vulnerable. This issue has been patched in version 8.3.2. Users should immediately upgrade to this version to mitigate the vulnerability. If upgrading is not feasible, users can mitigate the vulnerability by sanitizing user-controlled environment variable values before passing them to `dotenv.stringify`. Specifically, avoid using `"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-03T21:00:55.315512+00:00
2025-02-03T20:48:16.507000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[ "workaround" ]
[ "Users should immediately upgrade to this version to mitigate the vulnerability. If upgrading is not feasible, users can mitigate the vulnerability by sanitizing user-controlled environment variable values before passing them to `dotenv.stringify`. Specifically, avoid using `\"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage." ]
[ null ]
CVE-2025-26964
null
WordPress Eventin plugin <= 4.0.20 - Local File Inclusion vulnerability
null
null
null
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter Eventin allows PHP Local File Inclusion. This issue affects Eventin: from n/a through 4.0.20.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-27676
null
CVE-2025-27676
null
null
null
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Reports V-2023-002.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1158
null
ESAFENET CDG addPolicyToSafetyGroup.jsp sql injection
null
null
null
A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an unknown function of the file addPolicyToSafetyGroup.jsp. The manipulation of the argument safetyGroupId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-22474
null
CVE-2025-22474
null
null
null
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) a Server-Side Request Forgery (SSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-02-28T06:30:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1508
null
WP Crowdfunding <= 2.1.13 - Missing Authorization to Authenticated (Subscriber+) Post Content Download
null
null
null
The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_data action in all versions up to, and including, 2.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to download all of a site's post content when WooCommerce is installed.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-27363
CWE-787
freetype
OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
Important
null
8.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.
This vulnerability stems from improper handling of data types within the FreeType library during the parsing of font subglyph structures. This could causes incorrect calculations that result in heap buffer allocation being too small. This could allow the library write data beyond the allocated buffer, affecting adjacent memory areas, leading into arbitrary code executions compromising the entire system and system stability such as misleading behaviors in applications which relies on FreeType, or causing possible crashes impacting the entire system.
2025-03-11T14:00:48.605552+00:00
2025-03-11T13:28:31.705000+00:00
[]
[ "red_hat_enterprise_linux_6:freetype", "red_hat_enterprise_linux_7:freetype", "red_hat_enterprise_linux_8:freetype", "red_hat_enterprise_linux_8:java-17-openjdk", "red_hat_enterprise_linux_8:mingw-freetype", "red_hat_enterprise_linux_9:freetype", "red_hat_enterprise_linux_9:java-17-openjdk", "red_hat_openshift_container_platform_4:rhcos" ]
[ "red_hat_build_of_openjdk_11:java-11-openjdk-portable", "red_hat_build_of_openjdk_17:java-17-openjdk-portable", "red_hat_build_of_openjdk_21:java-21-openjdk-portable-rhel7", "red_hat_enterprise_linux_7:thunderbird", "red_hat_enterprise_linux_8:java-21-openjdk", "red_hat_enterprise_linux_9:firefox:flatpak/firefox", "red_hat_enterprise_linux_9:java-21-openjdk" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "By restricting the sources from which font files can be loaded allowing only fonts from trusted sources, as well as validating the input for font files to avoid malformed font structures or any data which could trigger the vulnerability would reduce the risk and mitigate this vulnerability until the fix is provided.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-23770
null
WordPress Fast Tube plugin <= 2.3.1 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Fast Tube allows Reflected XSS. This issue affects Fast Tube: from n/a through 2.3.1.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26572
null
WordPress WP PHPList Plugin <= 1.7 - CSRF to Stored XSS vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList allows Cross Site Request Forgery. This issue affects WP PHPList: from n/a through 1.7.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1764
null
LoginPress <= 3.3.1 - Cross-Site Request Forgery to Arbitrary Options Update
null
null
null
The LoginPress | wp-login Custom Login Page Customizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-25077
null
WordPress Easy Chart Builder for WordPress plugin <= 1.3 - Stored Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dugbug Easy Chart Builder for WordPress allows Stored XSS. This issue affects Easy Chart Builder for WordPress: from n/a through 1.3.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-22618
null
WeGIA Cross-Site Scripting (XSS) Stored endpoint 'adicionar_cargo.php' parameter 'cargo'
null
null
null
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_cargo.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `cargo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_cargo.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in release version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-0175
null
code-projects Online Shop view.php cross site scripting
null
null
null
A vulnerability was found in code-projects Online Shop 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /view.php. The manipulation of the argument name/details leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-2148
null
PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption
null
null
null
A vulnerability was found in PyTorch 2.6.0+cu124. It has been declared as critical. Affected by this vulnerability is the function torch.ops.profiler._call_end_callbacks_on_jit_fut of the component Tuple Handler. The manipulation of the argument None leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-0525
null
CVE-2025-0525
null
null
null
In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21521
null
mysql
Thread Pooling unspecified vulnerability (CPU Jan 2025)
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
null
2025-01-21T21:04:48.403277+00:00
2025-01-21T20:53:04.705000+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.src", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-common-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-debugsource-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-devel-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-devel-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-errmsg-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-libs-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-libs-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-server-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-server-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-test-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-test-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.src", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.src", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le", "AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.src", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.src", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.src", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.src", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.src", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x", "AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.src", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.src", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.src", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.src", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x", "AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64", "AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.src", "AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.x86_64", "AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.src", "AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.src", "AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.s390x", "AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.src", "CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.aarch64", "CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.ppc64le", "CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.s390x", "CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.x86_64", "CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.src", "CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.x86_64", "CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.aarch64", "CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.ppc64le", "CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.s390x", "CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.x86_64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64" ]
[]
[ "red_hat_enterprise_linux_6:mysql" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258" ]
[ "2025-02-19T11:10:11+00:00", "2025-03-17T07:43:54+00:00", "2025-03-17T06:06:04+00:00", "2025-02-24T13:18:54+00:00", "2025-02-24T06:26:38+00:00", "2025-02-24T04:37:43+00:00", "2025-02-24T13:31:44+00:00", "2025-02-24T04:57:13+00:00", "2025-02-19T10:31:41+00:00" ]
CVE-2025-0460
null
Blog Botz for Journal Theme blog_add unrestricted upload
null
null
null
A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-24373
null
Unrestricted Access to PDF Documents via URL Manipulation in woocommerce-pdf-invoices-packing-slips
null
null
null
woocommerce-pdf-invoices-packing-slips is an extension which allows users to create, print & automatically email PDF invoices & packing slips for WooCommerce orders. This vulnerability allows unauthorized users to access any PDF document from a store if they: 1. Have access to a guest document link and 2. Replace the URL variable `my-account` with `bulk`. The issue occurs when: 1. The store's document access is set to "guest." and 2. The user is logged out. This vulnerability compromises the confidentiality of sensitive documents, affecting all stores using the plugin with the guest access option enabled. This issue has been addressed in version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21171
CWE-122
dotnet
.NET Remote Code Execution Vulnerability
Important
null
7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
A remote code execution vulnerability was found in .NET. This flaw allows an attacker to load a specially crafted file into a vulnerable application.
This issue affects .NET Framework version 9.0 as shipped with all versions of RHEL. However, this flaw is not known to be exploitable under any supported scenario.
2025-01-14T19:09:51.102131+00:00
2025-01-14T18:03:22.942000+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-0:9.0.102-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.x86_64", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet9.0-0:9.0.102-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.x86_64", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-0:9.0.102-1.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.x86_64", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet9.0-0:9.0.102-1.el9_5.src", "CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.x86_64" ]
[]
[ "red_hat_enterprise_linux_8:dotnet8.0", "red_hat_enterprise_linux_9:dotnet6.0", "red_hat_enterprise_linux_9:dotnet7.0", "red_hat_enterprise_linux_9:dotnet8.0" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "workaround" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible." ]
[ "2025-01-16T17:27:06+00:00", "2025-01-14T01:20:44+00:00", null ]
CVE-2025-1621
null
GDPR Cookie Compliance < 4.15.7 - Admin+ Stored XSS
null
null
null
The GDPR Cookie Compliance WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-25132
null
WordPress Visitor Details plugin <= 1.0.1 - Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ravi Singh Visitor Details allows Stored XSS. This issue affects Visitor Details: from n/a through 1.0.1.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1271
null
Reflected Cross-Site Scripting (XSS) vulnerability in H6Web
null
null
null
Reflected Cross-Site Scripting (XSS) in Anapi Group's h6web. This security flaw could allow an attacker to inject malicious JavaScript code into a URL. When a user accesses that URL, the injected code is executed in their browser, which can result in the theft of sensitive information, identity theft or the execution of unauthorised actions on behalf of the affected user.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-02-13T11:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-25098
null
WordPress Links in Captions plugin <= 1.2 - Stored Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zack Katz Links in Captions allows Stored XSS. This issue affects Links in Captions: from n/a through 1.2.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-0899
null
PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability
null
null
null
PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25349.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-30T20:36:06.627000+00:00
2025-01-31T22:06:12.503000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26899
null
WordPress Recapture for WooCommerce Plugin <= 1.0.43 - CSRF to Settings Change vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in Recapture Cart Recovery and Email Marketing Recapture for WooCommerce allows Cross Site Request Forgery. This issue affects Recapture for WooCommerce: from n/a through 1.0.43.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-27271
null
WordPress DB Tables Import/Export Plugin <= 1.0.1 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DB Tables Import/Export allows Reflected XSS. This issue affects DB Tables Import/Export: from n/a through 1.0.1.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-22589
null
WordPress Quote Tweet plugin <= 0.7 - CSRF to Stored XSS vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in bozdoz Quote Tweet allows Stored XSS.This issue affects Quote Tweet: from n/a through 0.7.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26933
null
WordPress Place Order Without Payment for WooCommerce plugin <= 2.6.7 - Local File Inclusion vulnerability
null
null
null
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23662
null
WordPress WP Panoramio plugin <= 1.5.0 - CSRF to Cross-Site Scripting vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana WP Panoramio allows Stored XSS.This issue affects WP Panoramio: from n/a through 1.5.0.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23398
null
CVE-2025-23398
null
null
null
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-28887
null
WordPress Plugins Last Updated Column plugin <= 0.1.3 - Cross Site Request Forgery (CSRF) vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in Fastmover Plugins Last Updated Column allows Cross Site Request Forgery. This issue affects Plugins Last Updated Column: from n/a through 0.1.3.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-2373
null
PHPGurukul Human Metapneumovirus Testing Management System check_availability.php sql injection
null
null
null
A vulnerability classified as critical was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This vulnerability affects unknown code of the file /check_availability.php. The manipulation of the argument mobnumber/employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26525
CWE-552
moodle
Arbitrary file read risk through pdfTeX
Important
null
8.5/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-24T20:00:49.610497+00:00
2025-02-24T19:31:43.881000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-22835
null
Arkcompiler Ets Runtime has an out-of-bounds write vulnerability
null
null
null
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23727
null
WordPress AZ Content Finder plugin <= 0.1 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1949
null
ZZCMS URL register_nodb.php cross site scripting
null
null
null
A vulnerability, which was classified as problematic, has been found in ZZCMS 2025. This issue affects some unknown processing of the file /3/ucenter_api/code/register_nodb.php of the component URL Handler. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-28868
null
WordPress ZipList Recipe plugin <= 3.1 - Cross Site Request Forgery (CSRF) vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in ZipList ZipList Recipe allows Cross Site Request Forgery. This issue affects ZipList Recipe: from n/a through 3.1.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-22136
null
Tabby has a TCC Bypass via Misconfigured Node Fuses
null
null
null
Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.217 , Tabby enables several high-risk Electron Fuses, including RunAsNode, EnableNodeCliInspectArguments, and EnableNodeOptionsEnvironmentVariable. These fuses create potential code injection vectors even though the application is signed with hardened runtime and lacks dangerous entitlements such as com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables. This vulnerability is fixed in 1.0.217.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26876
null
WordPress Search with Typesense Plugin <= 2.0.8 - Path Traversal vulnerability
null
null
null
Path Traversal vulnerability in CodeManas Search with Typesense allows Path Traversal. This issue affects Search with Typesense: from n/a through 2.0.8.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-25759
null
CVE-2025-25759
null
null
null
An issue in the component admin_template.php of SUCMS v1.0 allows attackers to execute a directory traversal and arbitrary file deletion via a crafted GET request.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21599
null
Junos OS Evolved
Receipt of specifically malformed IPv6 packets causes kernel memory exhaustion leading to Denial of Service
null
null
null
A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.  Receipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS). Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition. This issue only affects systems configured with IPv6. This issue affects Junos OS Evolved:  * from 22.4-EVO before 22.4R3-S5-EVO,  * from 23.2-EVO before 23.2R2-S2-EVO,  * from 23.4-EVO before 23.4R2-S2-EVO,  * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-08T17:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-24631
null
WordPress BP Email Assign Templates Plugin <= 1.5 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PhiloPress BP Email Assign Templates allows Reflected XSS. This issue affects BP Email Assign Templates: from n/a through 1.5.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1363
null
easy-broken-link-checker <= 9.0.2 - Admin+ Stored XSS
null
null
null
The URL Shortener | Conversion Tracking | AB Testing | WooCommerce WordPress plugin through 9.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-0821
null
Bit Assist <= 1.5.2 - Authenticated (Subscriber+) SQL Injection via id Parameter
null
null
null
Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23818
null
WordPress More Link Modifier plugin <= 1.0.3 - CSRF to Cross-Site Scripting vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in Peggy Kuo More Link Modifier allows Stored XSS.This issue affects More Link Modifier: from n/a through 1.0.3.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21825
null
kernel
bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT During the update procedure, when overwrite element in a pre-allocated htab, the freeing of old_element is protected by the bucket lock. The reason why the bucket lock is necessary is that the old_element has already been stashed in htab->extra_elems after alloc_htab_elem() returns. If freeing the old_element after the bucket lock is unlocked, the stashed element may be reused by concurrent update procedure and the freeing of old_element will run concurrently with the reuse of the old_element. However, the invocation of check_and_free_fields() may acquire a spin-lock which violates the lockdep rule because its caller has already held a raw-spin-lock (bucket lock). The following warning will be reported when such race happens: BUG: scheduling while atomic: test_progs/676/0x00000003 3 locks held by test_progs/676: #0: ffffffff864b0240 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2c0/0x830 #1: ffff88810e961188 (&htab->lockdep_key){....}-{2:2}, at: htab_map_update_elem+0x306/0x1500 #2: ffff8881f4eac1b8 (&base->softirq_expiry_lock){....}-{2:2}, at: hrtimer_cancel_wait_running+0xe9/0x1b0 Modules linked in: bpf_testmod(O) Preemption disabled at: [<ffffffff817837a3>] htab_map_update_elem+0x293/0x1500 CPU: 0 UID: 0 PID: 676 Comm: test_progs Tainted: G ... 6.12.0+ #11 Tainted: [W]=WARN, [O]=OOT_MODULE Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)... Call Trace: <TASK> dump_stack_lvl+0x57/0x70 dump_stack+0x10/0x20 __schedule_bug+0x120/0x170 __schedule+0x300c/0x4800 schedule_rtlock+0x37/0x60 rtlock_slowlock_locked+0x6d9/0x54c0 rt_spin_lock+0x168/0x230 hrtimer_cancel_wait_running+0xe9/0x1b0 hrtimer_cancel+0x24/0x30 bpf_timer_delete_work+0x1d/0x40 bpf_timer_cancel_and_free+0x5e/0x80 bpf_obj_free_fields+0x262/0x4a0 check_and_free_fields+0x1d0/0x280 htab_map_update_elem+0x7fc/0x1500 bpf_prog_9f90bc20768e0cb9_overwrite_cb+0x3f/0x43 bpf_prog_ea601c4649694dbd_overwrite_timer+0x5d/0x7e bpf_prog_test_run_syscall+0x322/0x830 __sys_bpf+0x135d/0x3ca0 __x64_sys_bpf+0x75/0xb0 x64_sys_call+0x1b5/0xa10 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 ... </TASK> It seems feasible to break the reuse and refill of per-cpu extra_elems into two independent parts: reuse the per-cpu extra_elems with bucket lock being held and refill the old_element as per-cpu extra_elems after the bucket lock is unlocked. However, it will make the concurrent overwrite procedures on the same CPU return unexpected -E2BIG error when the map is full. Therefore, the patch fixes the lock problem by breaking the cancelling of bpf_timer into two steps for PREEMPT_RT: 1) use hrtimer_try_to_cancel() and check its return value 2) if the timer is running, use hrtimer_cancel() through a kworker to cancel it again Considering that the current implementation of hrtimer_cancel() will try to acquire a being held softirq_expiry_lock when the current timer is running, these steps above are reasonable. However, it also has downside. When the timer is running, the cancelling of the timer is delayed when releasing the last map uref. The delay is also fixable (e.g., break the cancelling of bpf timer into two parts: one part in locked scope, another one in unlocked scope), it can be revised later if necessary. It is a bit hard to decide the right fix tag. One reason is that the problem depends on PREEMPT_RT which is enabled in v6.12. Considering the softirq_expiry_lock lock exists since v5.4 and bpf_timer is introduced in v5.15, the bpf_timer commit is used in the fixes tag and an extra depends-on tag is added to state the dependency on PREEMPT_RT. Depends-on: v6.12+ with PREEMPT_RT enabled
null
2025-03-06T00:00:00+00:00
2025-03-06T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-1226
null
ywoa setup.jsp improper authorization
null
null
null
A vulnerability was found in ywoa up to 2024.07.03. It has been declared as critical. This vulnerability affects unknown code of the file /oa/setup/setup.jsp. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-27508
null
Emissary Use of a Broken or Risky Cryptographic Algorithm
null
null
null
Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1676
null
hzmanyun Education and Training System pdf2swf os command injection
null
null
null
A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. The manipulation of the argument file leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-25165
null
WordPress Staff Directory Plugin
Company Directory Plugin <= 4.3 - Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Staff Directory Plugin: Company Directory allows Stored XSS. This issue affects Staff Directory Plugin: Company Directory: from n/a through 4.3.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-27158
null
Acrobat Reader | Access of Uninitialized Pointer (CWE-824)
null
null
null
Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-03-11T17:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21126
null
InDesign Desktop | Improper Input Validation (CWE-20)
null
null
null
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an Improper Input Validation vulnerability that could result in an application denial-of-service condition. An attacker could exploit this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-02-11T17:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-0437
CWE-125
chromium-browser
Out of bounds read in Metrics
Important
null
8.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
A flaw was found in Metrics in Google Chrome. This issue may allow a remote attacker to exploit heap corruption via a crafted HTML page.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-15T12:01:01.422587+00:00
2025-01-15T10:58:52.779000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-26319
null
CVE-2025-26319
null
null
null
FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-0708
null
fumiao opencms Add Model Management Page addOrUpdate cross site scripting
null
null
null
A vulnerability was found in fumiao opencms 2.2. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/model/addOrUpdate of the component Add Model Management Page. The manipulation of the argument 模板前缀 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-29783
CWE-502
vllm
vLLM Allows Remote Code Execution via Mooncake Integration
Critical
null
10/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
A flaw was found in vLLM. In deployments where vLLM is configured to use Mooncake to distribute KV across hosts, this vulnerability allows remote code execution via unsafe deserialization exposed directly over ZMQ/TCP on all network interfaces.
RHEL-AI is not affected as it does not include Mooncake, which is required for vLLM to be configured in a way that would expose this vulnerability.
2025-03-19T16:01:22.470178+00:00
2025-03-19T15:33:28.951000+00:00
[]
[]
[ "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-amd-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-aws-nvidia-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-azure-amd-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-azure-nvidia-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-gcp-nvidia-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-ibm-nvidia-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-intel-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-nvidia-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/instructlab-amd-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/instructlab-intel-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/instructlab-nvidia-rhel9", "red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/ui-rhel9" ]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[]
[]
[]
CVE-2025-28891
null
WordPress price-calc plugin <= 0.6.3 - CSRF to Stored XSS vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in jazzigor price-calc allows Stored XSS. This issue affects price-calc: from n/a through 0.6.3.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-2365
null
crmeb_java WeChatMessageController.java webHook xml external entity reference
null
null
null
A vulnerability, which was classified as problematic, has been found in crmeb_java up to 1.3.4. Affected by this issue is the function webHook of the file WeChatMessageController.java. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23674
null
WordPress Bit.ly linker plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bit.ly linker allows Reflected XSS. This issue affects Bit.ly linker: from n/a through 1.1.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21649
CWE-476
kernel
net: hns3: fix kernel crash when 1588 is sent on HIP08 devices
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices Currently, HIP08 devices does not register the ptp devices, so the hdev->ptp is NULL. But the tx process would still try to set hardware time stamp info with SKBTX_HW_TSTAMP flag and cause a kernel crash. [ 128.087798] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018 ... [ 128.280251] pc : hclge_ptp_set_tx_info+0x2c/0x140 [hclge] [ 128.286600] lr : hclge_ptp_set_tx_info+0x20/0x140 [hclge] [ 128.292938] sp : ffff800059b93140 [ 128.297200] x29: ffff800059b93140 x28: 0000000000003280 [ 128.303455] x27: ffff800020d48280 x26: ffff0cb9dc814080 [ 128.309715] x25: ffff0cb9cde93fa0 x24: 0000000000000001 [ 128.315969] x23: 0000000000000000 x22: 0000000000000194 [ 128.322219] x21: ffff0cd94f986000 x20: 0000000000000000 [ 128.328462] x19: ffff0cb9d2a166c0 x18: 0000000000000000 [ 128.334698] x17: 0000000000000000 x16: ffffcf1fc523ed24 [ 128.340934] x15: 0000ffffd530a518 x14: 0000000000000000 [ 128.347162] x13: ffff0cd6bdb31310 x12: 0000000000000368 [ 128.353388] x11: ffff0cb9cfbc7070 x10: ffff2cf55dd11e02 [ 128.359606] x9 : ffffcf1f85a212b4 x8 : ffff0cd7cf27dab0 [ 128.365831] x7 : 0000000000000a20 x6 : ffff0cd7cf27d000 [ 128.372040] x5 : 0000000000000000 x4 : 000000000000ffff [ 128.378243] x3 : 0000000000000400 x2 : ffffcf1f85a21294 [ 128.384437] x1 : ffff0cb9db520080 x0 : ffff0cb9db500080 [ 128.390626] Call trace: [ 128.393964] hclge_ptp_set_tx_info+0x2c/0x140 [hclge] [ 128.399893] hns3_nic_net_xmit+0x39c/0x4c4 [hns3] [ 128.405468] xmit_one.constprop.0+0xc4/0x200 [ 128.410600] dev_hard_start_xmit+0x54/0xf0 [ 128.415556] sch_direct_xmit+0xe8/0x634 [ 128.420246] __dev_queue_xmit+0x224/0xc70 [ 128.425101] dev_queue_xmit+0x1c/0x40 [ 128.429608] ovs_vport_send+0xac/0x1a0 [openvswitch] [ 128.435409] do_output+0x60/0x17c [openvswitch] [ 128.440770] do_execute_actions+0x898/0x8c4 [openvswitch] [ 128.446993] ovs_execute_actions+0x64/0xf0 [openvswitch] [ 128.453129] ovs_dp_process_packet+0xa0/0x224 [openvswitch] [ 128.459530] ovs_vport_receive+0x7c/0xfc [openvswitch] [ 128.465497] internal_dev_xmit+0x34/0xb0 [openvswitch] [ 128.471460] xmit_one.constprop.0+0xc4/0x200 [ 128.476561] dev_hard_start_xmit+0x54/0xf0 [ 128.481489] __dev_queue_xmit+0x968/0xc70 [ 128.486330] dev_queue_xmit+0x1c/0x40 [ 128.490856] ip_finish_output2+0x250/0x570 [ 128.495810] __ip_finish_output+0x170/0x1e0 [ 128.500832] ip_finish_output+0x3c/0xf0 [ 128.505504] ip_output+0xbc/0x160 [ 128.509654] ip_send_skb+0x58/0xd4 [ 128.513892] udp_send_skb+0x12c/0x354 [ 128.518387] udp_sendmsg+0x7a8/0x9c0 [ 128.522793] inet_sendmsg+0x4c/0x8c [ 128.527116] __sock_sendmsg+0x48/0x80 [ 128.531609] __sys_sendto+0x124/0x164 [ 128.536099] __arm64_sys_sendto+0x30/0x5c [ 128.540935] invoke_syscall+0x50/0x130 [ 128.545508] el0_svc_common.constprop.0+0x10c/0x124 [ 128.551205] do_el0_svc+0x34/0xdc [ 128.555347] el0_svc+0x20/0x30 [ 128.559227] el0_sync_handler+0xb8/0xc0 [ 128.563883] el0_sync+0x160/0x180
null
2025-01-19T00:00:00+00:00
2025-01-19T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Will not fix", "Affected" ]
[ null, null ]
CVE-2025-1119
null
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.8.5 - Unauthenticated Arbitrary Shortcode Execution
null
null
null
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-27637
null
CVE-2025-27637
null
null
null
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows Cross-Site Scripting V-2024-016.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26925
null
WordPress Admin Menu Manager plugin <= 1.0.3 - Cross Site Request Forgery (CSRF) vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in Required Admin Menu Manager allows Cross Site Request Forgery.This issue affects Admin Menu Manager: from n/a through 1.0.3.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-20058
null
BIG-IP message routing vulnerability
null
null
null
When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-02-05T15:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-22570
null
WordPress Inline Tweets plugin <= 2.0 - Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Miloš Đekić Inline Tweets allows Stored XSS.This issue affects Inline Tweets: from n/a through 2.0.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26163
null
CVE-2025-26163
null
null
null
CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the CPF parameter.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-23731
null
WordPress Tax Report for WooCommerce plugin <= 2.2 - Reflected Cross Site Scripting (XSS) vulnerability
null
null
null
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in infosoftplugin Tax Report for WooCommerce allows Reflected XSS. This issue affects Tax Report for WooCommerce: from n/a through 2.2.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-2220
null
Odyssey CMS reCAPTCHA odyssey_contact_form.php key management
null
null
null
A vulnerability was found in Odyssey CMS up to 10.34. It has been classified as problematic. Affected is an unknown function of the file /modules/odyssey_contact_form/odyssey_contact_form.php of the component reCAPTCHA Handler. The manipulation of the argument g-recaptcha-response leads to key management error. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2025-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
End of preview. Expand in Data Studio

Dataset Card for RedHat-security-VeX

This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.

Dataset Details

Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/

This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG.

Data is extracted and uploaded using the following script: https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser

  • Curated by: Huzaifa Sidhpurwala [email protected]
  • License: Creative Commons Attribution 4.0 International License

Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

References

Disclaimer

This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data

Downloads last month
488

Models trained or fine-tuned on huzaifas-sidhpurwala/RedHat-security-VeX

Collection including huzaifas-sidhpurwala/RedHat-security-VeX