
cve
stringlengths 13
16
| cwe
stringclasses 476
values | affected_component
stringlengths 0
256
| summary
stringlengths 0
246
| severity
stringclasses 5
values | cvss_v2
stringclasses 250
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 20
4k
| statement
stringlengths 31
2.49k
⌀ | discovery_date
stringlengths 25
32
⌀ | release_date
stringlengths 25
32
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
602
| known_not_affected_products
sequencelengths 0
30.2k
| under_investigation_products
sequencelengths 0
78
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
217
| remediation_details
sequencelengths 0
217
| remediation_dates
sequencelengths 0
217
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2025-0749 | null | Homey <= 2.4.3 - Limited Authentication Bypass due to Missing Empty Value Check | null | null | null | The Homey theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.3. This is due to the 'verification_id' value being set to empty, and the not empty check is missing in the dashboard user profile page. This makes it possible for unauthenticated attackers to log in to the first verified user. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-2324 | null | A MOVEit Transfer user configured as a Shared Account can gain unintended List permissions on a folder | null | null | null | Improper Privilege Management vulnerability for users configured as Shared Accounts in Progress MOVEit Transfer (SFTP module) allows Privilege Escalation.This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.12, from 2024.0.0 before 2024.0.8, from 2024.1.0 before 2024.1.2. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21608 | null | Forged packets over MQTT can show up in direct messages in Meshtastic firmware | null | null | null | Meshtastic is an open source mesh networking solution. In affected firmware versions crafted packets over MQTT are able to appear as a DM in client to a node even though they were not decoded with PKC. This issue has been addressed in version 2.5.19 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23635 | null | WordPress ePermissions plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mobde3net ePermissions allows Reflected XSS. This issue affects ePermissions: from n/a through 1.2. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-24959 | CWE-94 | zx | Environment Variable Injection for dotenv API in zx | None | null | 0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N | zx is a tool for writing better scripts. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to arbitrary command execution or unexpected behavior in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly vulnerable. This issue has been patched in version 8.3.2. Users should immediately upgrade to this version to mitigate the vulnerability. If upgrading is not feasible, users can mitigate the vulnerability by sanitizing user-controlled environment variable values before passing them to `dotenv.stringify`. Specifically, avoid using `"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-02-03T21:00:55.315512+00:00 | 2025-02-03T20:48:16.507000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [
"workaround"
] | [
"Users should immediately upgrade to this version to mitigate the vulnerability. If upgrading is not feasible, users can mitigate the vulnerability by sanitizing user-controlled environment variable values before passing them to `dotenv.stringify`. Specifically, avoid using `\"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage."
] | [
null
] |
CVE-2025-26964 | null | WordPress Eventin plugin <= 4.0.20 - Local File Inclusion vulnerability | null | null | null | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter Eventin allows PHP Local File Inclusion. This issue affects Eventin: from n/a through 4.0.20. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-27676 | null | CVE-2025-27676 | null | null | null | Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Reports V-2023-002. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1158 | null | ESAFENET CDG addPolicyToSafetyGroup.jsp sql injection | null | null | null | A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an unknown function of the file addPolicyToSafetyGroup.jsp. The manipulation of the argument safetyGroupId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-22474 | null | CVE-2025-22474 | null | null | null | Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) a Server-Side Request Forgery (SSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-02-28T06:30:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1508 | null | WP Crowdfunding <= 2.1.13 - Missing Authorization to Authenticated (Subscriber+) Post Content Download | null | null | null | The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_data action in all versions up to, and including, 2.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to download all of a site's post content when WooCommerce is installed. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-27363 | CWE-787 | freetype | OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files | Important | null | 8.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior. | This vulnerability stems from improper handling of data types within the FreeType library during the parsing of font subglyph structures. This could causes incorrect calculations that result in heap buffer allocation being too small. This could allow the library write data beyond the allocated buffer, affecting adjacent memory areas, leading into arbitrary code executions compromising the entire system and system stability such as misleading behaviors in applications which relies on FreeType, or causing possible crashes impacting the entire system. | 2025-03-11T14:00:48.605552+00:00 | 2025-03-11T13:28:31.705000+00:00 | [] | [
"red_hat_enterprise_linux_6:freetype",
"red_hat_enterprise_linux_7:freetype",
"red_hat_enterprise_linux_8:freetype",
"red_hat_enterprise_linux_8:java-17-openjdk",
"red_hat_enterprise_linux_8:mingw-freetype",
"red_hat_enterprise_linux_9:freetype",
"red_hat_enterprise_linux_9:java-17-openjdk",
"red_hat_openshift_container_platform_4:rhcos"
] | [
"red_hat_build_of_openjdk_11:java-11-openjdk-portable",
"red_hat_build_of_openjdk_17:java-17-openjdk-portable",
"red_hat_build_of_openjdk_21:java-21-openjdk-portable-rhel7",
"red_hat_enterprise_linux_7:thunderbird",
"red_hat_enterprise_linux_8:java-21-openjdk",
"red_hat_enterprise_linux_9:firefox:flatpak/firefox",
"red_hat_enterprise_linux_9:java-21-openjdk"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"workaround",
"no_fix_planned",
"none_available"
] | [
"By restricting the sources from which font files can be loaded allowing only fonts from trusted sources, as well as validating the input for font files to avoid malformed font structures or any data which could trigger the vulnerability would reduce the risk and mitigate this vulnerability until the fix is provided.",
"Out of support scope",
"Affected"
] | [
null,
null,
null
] |
CVE-2025-23770 | null | WordPress Fast Tube plugin <= 2.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Fast Tube allows Reflected XSS. This issue affects Fast Tube: from n/a through 2.3.1. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26572 | null | WordPress WP PHPList Plugin <= 1.7 - CSRF to Stored XSS vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList allows Cross Site Request Forgery. This issue affects WP PHPList: from n/a through 1.7. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1764 | null | LoginPress <= 3.3.1 - Cross-Site Request Forgery to Arbitrary Options Update | null | null | null | The LoginPress | wp-login Custom Login Page Customizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-25077 | null | WordPress Easy Chart Builder for WordPress plugin <= 1.3 - Stored Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dugbug Easy Chart Builder for WordPress allows Stored XSS. This issue affects Easy Chart Builder for WordPress: from n/a through 1.3. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-22618 | null | WeGIA Cross-Site Scripting (XSS) Stored endpoint 'adicionar_cargo.php' parameter 'cargo' | null | null | null | WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_cargo.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `cargo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_cargo.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in release version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-0175 | null | code-projects Online Shop view.php cross site scripting | null | null | null | A vulnerability was found in code-projects Online Shop 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /view.php. The manipulation of the argument name/details leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-2148 | null | PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption | null | null | null | A vulnerability was found in PyTorch 2.6.0+cu124. It has been declared as critical. Affected by this vulnerability is the function torch.ops.profiler._call_end_callbacks_on_jit_fut of the component Tuple Handler. The manipulation of the argument None leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-0525 | null | CVE-2025-0525 | null | null | null | In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21521 | null | mysql | Thread Pooling unspecified vulnerability (CPU Jan 2025) | Important | null | 7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | null | 2025-01-21T21:04:48.403277+00:00 | 2025-01-21T20:53:04.705000+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.src",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-common-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-debugsource-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-devel-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-devel-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-errmsg-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-libs-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-libs-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-server-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-server-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-test-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.2.0.Z.AUS:mysql:8.0:8020020250307052449:4cda2c84:mysql-test-debuginfo-0:8.0.40-1.module+el8.2.0+22898+0bdd8c5b.4.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.src",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.AUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.src",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.ppc64le",
"AppStream-8.4.0.Z.E4S:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.src",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debuginfo-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-debugsource-0:0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.src",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-common-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-debugsource-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-devel-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-errmsg-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-libs-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-server-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.4.0.Z.TUS:mysql:8.0:8040020250308034252:522a0ee4:mysql-test-debuginfo-0:8.0.40-1.module+el8.4.0+22899+4f2ca788.1.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.src",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.src",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.AUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.src",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.src",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.aarch64",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.ppc64le",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.s390x",
"AppStream-8.6.0.Z.E4S:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.src",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debuginfo-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-debugsource-0:0.996-2.module+el8.6.0+16523+5cb0e868.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.src",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-common-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-debugsource-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-devel-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-errmsg-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-libs-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-server-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.6.0.Z.TUS:mysql:8.0:8060020250214145213:ad008a3a:mysql-test-debuginfo-0:8.0.40-1.module+el8.6.0+22864+ceaef991.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.src",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debuginfo-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-debugsource-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-devel-0:0.996-2.module+el8.8.0+18436+8918dd75.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mecab-ipadic-EUCJP-0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.src",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-common-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-debugsource-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-devel-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-errmsg-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-libs-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-server-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.aarch64",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.ppc64le",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.s390x",
"AppStream-8.8.0.Z.EUS:mysql:8.0:8080020250214144259:63b34585:mysql-test-debuginfo-0:8.0.40-1.module+el8.8.0+22863+a1071e1e.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.src",
"AppStream-9.0.0.Z.E4S:mysql-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-common-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-debuginfo-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-debugsource-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-devel-debuginfo-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-errmsg-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-libs-debuginfo-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-server-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-server-debuginfo-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:mysql-test-debuginfo-0:8.0.40-2.el9_0.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.src",
"CRB-9.2.0.Z.EUS:mysql-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-common-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-server-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-test-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.aarch64",
"CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.ppc64le",
"CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.s390x",
"CRB-9.2.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_2.1.x86_64",
"CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.src",
"CRB-9.4.0.Z.EUS:mysql-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-common-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-debuginfo-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-debugsource-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-devel-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-devel-debuginfo-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-errmsg-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-libs-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-libs-debuginfo-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-server-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-server-debuginfo-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-test-0:8.0.40-1.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.s390x",
"CRB-9.4.0.Z.EUS:mysql-test-debuginfo-0:8.0.40-1.el9_4.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
] | [] | [
"red_hat_enterprise_linux_6:mysql"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258"
] | [
"2025-02-19T11:10:11+00:00",
"2025-03-17T07:43:54+00:00",
"2025-03-17T06:06:04+00:00",
"2025-02-24T13:18:54+00:00",
"2025-02-24T06:26:38+00:00",
"2025-02-24T04:37:43+00:00",
"2025-02-24T13:31:44+00:00",
"2025-02-24T04:57:13+00:00",
"2025-02-19T10:31:41+00:00"
] |
CVE-2025-0460 | null | Blog Botz for Journal Theme blog_add unrestricted upload | null | null | null | A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-24373 | null | Unrestricted Access to PDF Documents via URL Manipulation in woocommerce-pdf-invoices-packing-slips | null | null | null | woocommerce-pdf-invoices-packing-slips is an extension which allows users to create, print & automatically email PDF invoices & packing slips for WooCommerce orders. This vulnerability allows unauthorized users to access any PDF document from a store if they: 1. Have access to a guest document link and 2. Replace the URL variable `my-account` with `bulk`. The issue occurs when: 1. The store's document access is set to "guest." and 2. The user is logged out. This vulnerability compromises the confidentiality of sensitive documents, affecting all stores using the plugin with the guest access option enabled. This issue has been addressed in version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21171 | CWE-122 | dotnet | .NET Remote Code Execution Vulnerability | Important | null | 7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | A remote code execution vulnerability was found in .NET. This flaw allows an attacker to load a specially crafted file into a vulnerable application. | This issue affects .NET Framework version 9.0 as shipped with all versions of RHEL. However, this flaw is not known to be exploitable under any supported scenario. | 2025-01-14T19:09:51.102131+00:00 | 2025-01-14T18:03:22.942000+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-0:9.0.102-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.x86_64",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-0:9.0.102-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-runtime-dbg-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-sdk-dbg-9.0-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-targeting-pack-9.0-0:9.0.1-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet-templates-9.0-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-0:9.0.102-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debuginfo-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:dotnet9.0-debugsource-0:9.0.102-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:9.0.102-1.el8_10.x86_64",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:aspnetcore-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:aspnetcore-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-apphost-pack-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-host-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-host-debuginfo-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-hostfxr-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-9.0-debuginfo-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-runtime-dbg-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-9.0-source-built-artifacts-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-aot-9.0-debuginfo-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-sdk-dbg-9.0-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-targeting-pack-9.0-0:9.0.1-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet-templates-9.0-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet9.0-0:9.0.102-1.el9_5.src",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debuginfo-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:dotnet9.0-debugsource-0:9.0.102-1.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:netstandard-targeting-pack-2.1-0:9.0.102-1.el9_5.x86_64"
] | [] | [
"red_hat_enterprise_linux_8:dotnet8.0",
"red_hat_enterprise_linux_9:dotnet6.0",
"red_hat_enterprise_linux_9:dotnet7.0",
"red_hat_enterprise_linux_9:dotnet8.0"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"workaround"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible."
] | [
"2025-01-16T17:27:06+00:00",
"2025-01-14T01:20:44+00:00",
null
] |
CVE-2025-1621 | null | GDPR Cookie Compliance < 4.15.7 - Admin+ Stored XSS | null | null | null | The GDPR Cookie Compliance WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-25132 | null | WordPress Visitor Details plugin <= 1.0.1 - Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ravi Singh Visitor Details allows Stored XSS. This issue affects Visitor Details: from n/a through 1.0.1. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1271 | null | Reflected Cross-Site Scripting (XSS) vulnerability in H6Web | null | null | null | Reflected Cross-Site Scripting (XSS) in Anapi Group's h6web. This security flaw could allow an attacker to inject malicious JavaScript code into a URL. When a user accesses that URL, the injected code is executed in their browser, which can result in the theft of sensitive information, identity theft or the execution of unauthorised actions on behalf of the affected user. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-02-13T11:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-25098 | null | WordPress Links in Captions plugin <= 1.2 - Stored Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zack Katz Links in Captions allows Stored XSS. This issue affects Links in Captions: from n/a through 1.2. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-0899 | null | PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability | null | null | null | PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25349. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-01-30T20:36:06.627000+00:00 | 2025-01-31T22:06:12.503000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26899 | null | WordPress Recapture for WooCommerce Plugin <= 1.0.43 - CSRF to Settings Change vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in Recapture Cart Recovery and Email Marketing Recapture for WooCommerce allows Cross Site Request Forgery. This issue affects Recapture for WooCommerce: from n/a through 1.0.43. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-27271 | null | WordPress DB Tables Import/Export Plugin <= 1.0.1 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DB Tables Import/Export allows Reflected XSS. This issue affects DB Tables Import/Export: from n/a through 1.0.1. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-22589 | null | WordPress Quote Tweet plugin <= 0.7 - CSRF to Stored XSS vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in bozdoz Quote Tweet allows Stored XSS.This issue affects Quote Tweet: from n/a through 0.7. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26933 | null | WordPress Place Order Without Payment for WooCommerce plugin <= 2.6.7 - Local File Inclusion vulnerability | null | null | null | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23662 | null | WordPress WP Panoramio plugin <= 1.5.0 - CSRF to Cross-Site Scripting vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana WP Panoramio allows Stored XSS.This issue affects WP Panoramio: from n/a through 1.5.0. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23398 | null | CVE-2025-23398 | null | null | null | A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-28887 | null | WordPress Plugins Last Updated Column plugin <= 0.1.3 - Cross Site Request Forgery (CSRF) vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in Fastmover Plugins Last Updated Column allows Cross Site Request Forgery. This issue affects Plugins Last Updated Column: from n/a through 0.1.3. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-2373 | null | PHPGurukul Human Metapneumovirus Testing Management System check_availability.php sql injection | null | null | null | A vulnerability classified as critical was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This vulnerability affects unknown code of the file /check_availability.php. The manipulation of the argument mobnumber/employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26525 | CWE-552 | moodle | Arbitrary file read risk through pdfTeX | Important | null | 8.5/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N | Insufficient sanitizing in the TeX notation filter resulted in an
arbitrary file read risk on sites where pdfTeX is available (such as
those with TeX Live installed). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-02-24T20:00:49.610497+00:00 | 2025-02-24T19:31:43.881000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2025-22835 | null | Arkcompiler Ets Runtime has an out-of-bounds write vulnerability | null | null | null | in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23727 | null | WordPress AZ Content Finder plugin <= 0.1 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1949 | null | ZZCMS URL register_nodb.php cross site scripting | null | null | null | A vulnerability, which was classified as problematic, has been found in ZZCMS 2025. This issue affects some unknown processing of the file /3/ucenter_api/code/register_nodb.php of the component URL Handler. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-28868 | null | WordPress ZipList Recipe plugin <= 3.1 - Cross Site Request Forgery (CSRF) vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in ZipList ZipList Recipe allows Cross Site Request Forgery. This issue affects ZipList Recipe: from n/a through 3.1. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-22136 | null | Tabby has a TCC Bypass via Misconfigured Node Fuses | null | null | null | Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.217 , Tabby enables several high-risk Electron Fuses, including RunAsNode, EnableNodeCliInspectArguments, and EnableNodeOptionsEnvironmentVariable. These fuses create potential code injection vectors even though the application is signed with hardened runtime and lacks dangerous entitlements such as com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables. This vulnerability is fixed in 1.0.217. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26876 | null | WordPress Search with Typesense Plugin <= 2.0.8 - Path Traversal vulnerability | null | null | null | Path Traversal vulnerability in CodeManas Search with Typesense allows Path Traversal. This issue affects Search with Typesense: from n/a through 2.0.8. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-25759 | null | CVE-2025-25759 | null | null | null | An issue in the component admin_template.php of SUCMS v1.0 allows attackers to execute a directory traversal and arbitrary file deletion via a crafted GET request. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21599 | null | Junos OS Evolved | Receipt of specifically malformed IPv6 packets causes kernel memory exhaustion leading to Denial of Service | null | null | null | A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.
Receipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS). Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition.
This issue only affects systems configured with IPv6.
This issue affects Junos OS Evolved:
* from 22.4-EVO before 22.4R3-S5-EVO,
* from 23.2-EVO before 23.2R2-S2-EVO,
* from 23.4-EVO before 23.4R2-S2-EVO,
* from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.
This issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-08T17:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
CVE-2025-24631 | null | WordPress BP Email Assign Templates Plugin <= 1.5 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PhiloPress BP Email Assign Templates allows Reflected XSS. This issue affects BP Email Assign Templates: from n/a through 1.5. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1363 | null | easy-broken-link-checker <= 9.0.2 - Admin+ Stored XSS | null | null | null | The URL Shortener | Conversion Tracking | AB Testing | WooCommerce WordPress plugin through 9.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-0821 | null | Bit Assist <= 1.5.2 - Authenticated (Subscriber+) SQL Injection via id Parameter | null | null | null | Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23818 | null | WordPress More Link Modifier plugin <= 1.0.3 - CSRF to Cross-Site Scripting vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in Peggy Kuo More Link Modifier allows Stored XSS.This issue affects More Link Modifier: from n/a through 1.0.3. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21825 | null | kernel | bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT
During the update procedure, when overwrite element in a pre-allocated
htab, the freeing of old_element is protected by the bucket lock. The
reason why the bucket lock is necessary is that the old_element has
already been stashed in htab->extra_elems after alloc_htab_elem()
returns. If freeing the old_element after the bucket lock is unlocked,
the stashed element may be reused by concurrent update procedure and the
freeing of old_element will run concurrently with the reuse of the
old_element. However, the invocation of check_and_free_fields() may
acquire a spin-lock which violates the lockdep rule because its caller
has already held a raw-spin-lock (bucket lock). The following warning
will be reported when such race happens:
BUG: scheduling while atomic: test_progs/676/0x00000003
3 locks held by test_progs/676:
#0: ffffffff864b0240 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2c0/0x830
#1: ffff88810e961188 (&htab->lockdep_key){....}-{2:2}, at: htab_map_update_elem+0x306/0x1500
#2: ffff8881f4eac1b8 (&base->softirq_expiry_lock){....}-{2:2}, at: hrtimer_cancel_wait_running+0xe9/0x1b0
Modules linked in: bpf_testmod(O)
Preemption disabled at:
[<ffffffff817837a3>] htab_map_update_elem+0x293/0x1500
CPU: 0 UID: 0 PID: 676 Comm: test_progs Tainted: G ... 6.12.0+ #11
Tainted: [W]=WARN, [O]=OOT_MODULE
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)...
Call Trace:
<TASK>
dump_stack_lvl+0x57/0x70
dump_stack+0x10/0x20
__schedule_bug+0x120/0x170
__schedule+0x300c/0x4800
schedule_rtlock+0x37/0x60
rtlock_slowlock_locked+0x6d9/0x54c0
rt_spin_lock+0x168/0x230
hrtimer_cancel_wait_running+0xe9/0x1b0
hrtimer_cancel+0x24/0x30
bpf_timer_delete_work+0x1d/0x40
bpf_timer_cancel_and_free+0x5e/0x80
bpf_obj_free_fields+0x262/0x4a0
check_and_free_fields+0x1d0/0x280
htab_map_update_elem+0x7fc/0x1500
bpf_prog_9f90bc20768e0cb9_overwrite_cb+0x3f/0x43
bpf_prog_ea601c4649694dbd_overwrite_timer+0x5d/0x7e
bpf_prog_test_run_syscall+0x322/0x830
__sys_bpf+0x135d/0x3ca0
__x64_sys_bpf+0x75/0xb0
x64_sys_call+0x1b5/0xa10
do_syscall_64+0x3b/0xc0
entry_SYSCALL_64_after_hwframe+0x4b/0x53
...
</TASK>
It seems feasible to break the reuse and refill of per-cpu extra_elems
into two independent parts: reuse the per-cpu extra_elems with bucket
lock being held and refill the old_element as per-cpu extra_elems after
the bucket lock is unlocked. However, it will make the concurrent
overwrite procedures on the same CPU return unexpected -E2BIG error when
the map is full.
Therefore, the patch fixes the lock problem by breaking the cancelling
of bpf_timer into two steps for PREEMPT_RT:
1) use hrtimer_try_to_cancel() and check its return value
2) if the timer is running, use hrtimer_cancel() through a kworker to
cancel it again
Considering that the current implementation of hrtimer_cancel() will try
to acquire a being held softirq_expiry_lock when the current timer is
running, these steps above are reasonable. However, it also has
downside. When the timer is running, the cancelling of the timer is
delayed when releasing the last map uref. The delay is also fixable
(e.g., break the cancelling of bpf timer into two parts: one part in
locked scope, another one in unlocked scope), it can be revised later if
necessary.
It is a bit hard to decide the right fix tag. One reason is that the
problem depends on PREEMPT_RT which is enabled in v6.12. Considering the
softirq_expiry_lock lock exists since v5.4 and bpf_timer is introduced
in v5.15, the bpf_timer commit is used in the fixes tag and an extra
depends-on tag is added to state the dependency on PREEMPT_RT.
Depends-on: v6.12+ with PREEMPT_RT enabled | null | 2025-03-06T00:00:00+00:00 | 2025-03-06T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-1226 | null | ywoa setup.jsp improper authorization | null | null | null | A vulnerability was found in ywoa up to 2024.07.03. It has been declared as critical. This vulnerability affects unknown code of the file /oa/setup/setup.jsp. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-27508 | null | Emissary Use of a Broken or Risky Cryptographic Algorithm | null | null | null | Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-1676 | null | hzmanyun Education and Training System pdf2swf os command injection | null | null | null | A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. The manipulation of the argument file leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-25165 | null | WordPress Staff Directory Plugin | Company Directory Plugin <= 4.3 - Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Staff Directory Plugin: Company Directory allows Stored XSS. This issue affects Staff Directory Plugin: Company Directory: from n/a through 4.3. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
CVE-2025-27158 | null | Acrobat Reader | Access of Uninitialized Pointer (CWE-824) | null | null | null | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-03-11T17:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21126 | null | InDesign Desktop | Improper Input Validation (CWE-20) | null | null | null | InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an Improper Input Validation vulnerability that could result in an application denial-of-service condition. An attacker could exploit this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-02-11T17:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-0437 | CWE-125 | chromium-browser | Out of bounds read in Metrics | Important | null | 8.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | A flaw was found in Metrics in Google Chrome. This issue may allow a remote attacker to exploit heap corruption via a crafted HTML page. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-01-15T12:01:01.422587+00:00 | 2025-01-15T10:58:52.779000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2025-26319 | null | CVE-2025-26319 | null | null | null | FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-0708 | null | fumiao opencms Add Model Management Page addOrUpdate cross site scripting | null | null | null | A vulnerability was found in fumiao opencms 2.2. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/model/addOrUpdate of the component Add Model Management Page. The manipulation of the argument 模板前缀 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-29783 | CWE-502 | vllm | vLLM Allows Remote Code Execution via Mooncake Integration | Critical | null | 10/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | A flaw was found in vLLM. In deployments where vLLM is configured to use Mooncake to distribute KV across hosts, this vulnerability allows remote code execution via unsafe deserialization exposed directly over ZMQ/TCP on all network interfaces. | RHEL-AI is not affected as it does not include Mooncake, which is required for vLLM to be configured in a way that would expose this vulnerability. | 2025-03-19T16:01:22.470178+00:00 | 2025-03-19T15:33:28.951000+00:00 | [] | [] | [
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-amd-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-aws-nvidia-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-azure-amd-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-azure-nvidia-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-gcp-nvidia-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-ibm-nvidia-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-intel-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/bootc-nvidia-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/instructlab-amd-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/instructlab-intel-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/instructlab-nvidia-rhel9",
"red_hat_enterprise_linux_ai_(rhel_ai):rhelai1/ui-rhel9"
] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [] | [] | [] |
CVE-2025-28891 | null | WordPress price-calc plugin <= 0.6.3 - CSRF to Stored XSS vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in jazzigor price-calc allows Stored XSS. This issue affects price-calc: from n/a through 0.6.3. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-2365 | null | crmeb_java WeChatMessageController.java webHook xml external entity reference | null | null | null | A vulnerability, which was classified as problematic, has been found in crmeb_java up to 1.3.4. Affected by this issue is the function webHook of the file WeChatMessageController.java. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23674 | null | WordPress Bit.ly linker plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bit.ly linker allows Reflected XSS. This issue affects Bit.ly linker: from n/a through 1.1. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21649 | CWE-476 | kernel | net: hns3: fix kernel crash when 1588 is sent on HIP08 devices | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: hns3: fix kernel crash when 1588 is sent on HIP08 devices
Currently, HIP08 devices does not register the ptp devices, so the
hdev->ptp is NULL. But the tx process would still try to set hardware time
stamp info with SKBTX_HW_TSTAMP flag and cause a kernel crash.
[ 128.087798] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
...
[ 128.280251] pc : hclge_ptp_set_tx_info+0x2c/0x140 [hclge]
[ 128.286600] lr : hclge_ptp_set_tx_info+0x20/0x140 [hclge]
[ 128.292938] sp : ffff800059b93140
[ 128.297200] x29: ffff800059b93140 x28: 0000000000003280
[ 128.303455] x27: ffff800020d48280 x26: ffff0cb9dc814080
[ 128.309715] x25: ffff0cb9cde93fa0 x24: 0000000000000001
[ 128.315969] x23: 0000000000000000 x22: 0000000000000194
[ 128.322219] x21: ffff0cd94f986000 x20: 0000000000000000
[ 128.328462] x19: ffff0cb9d2a166c0 x18: 0000000000000000
[ 128.334698] x17: 0000000000000000 x16: ffffcf1fc523ed24
[ 128.340934] x15: 0000ffffd530a518 x14: 0000000000000000
[ 128.347162] x13: ffff0cd6bdb31310 x12: 0000000000000368
[ 128.353388] x11: ffff0cb9cfbc7070 x10: ffff2cf55dd11e02
[ 128.359606] x9 : ffffcf1f85a212b4 x8 : ffff0cd7cf27dab0
[ 128.365831] x7 : 0000000000000a20 x6 : ffff0cd7cf27d000
[ 128.372040] x5 : 0000000000000000 x4 : 000000000000ffff
[ 128.378243] x3 : 0000000000000400 x2 : ffffcf1f85a21294
[ 128.384437] x1 : ffff0cb9db520080 x0 : ffff0cb9db500080
[ 128.390626] Call trace:
[ 128.393964] hclge_ptp_set_tx_info+0x2c/0x140 [hclge]
[ 128.399893] hns3_nic_net_xmit+0x39c/0x4c4 [hns3]
[ 128.405468] xmit_one.constprop.0+0xc4/0x200
[ 128.410600] dev_hard_start_xmit+0x54/0xf0
[ 128.415556] sch_direct_xmit+0xe8/0x634
[ 128.420246] __dev_queue_xmit+0x224/0xc70
[ 128.425101] dev_queue_xmit+0x1c/0x40
[ 128.429608] ovs_vport_send+0xac/0x1a0 [openvswitch]
[ 128.435409] do_output+0x60/0x17c [openvswitch]
[ 128.440770] do_execute_actions+0x898/0x8c4 [openvswitch]
[ 128.446993] ovs_execute_actions+0x64/0xf0 [openvswitch]
[ 128.453129] ovs_dp_process_packet+0xa0/0x224 [openvswitch]
[ 128.459530] ovs_vport_receive+0x7c/0xfc [openvswitch]
[ 128.465497] internal_dev_xmit+0x34/0xb0 [openvswitch]
[ 128.471460] xmit_one.constprop.0+0xc4/0x200
[ 128.476561] dev_hard_start_xmit+0x54/0xf0
[ 128.481489] __dev_queue_xmit+0x968/0xc70
[ 128.486330] dev_queue_xmit+0x1c/0x40
[ 128.490856] ip_finish_output2+0x250/0x570
[ 128.495810] __ip_finish_output+0x170/0x1e0
[ 128.500832] ip_finish_output+0x3c/0xf0
[ 128.505504] ip_output+0xbc/0x160
[ 128.509654] ip_send_skb+0x58/0xd4
[ 128.513892] udp_send_skb+0x12c/0x354
[ 128.518387] udp_sendmsg+0x7a8/0x9c0
[ 128.522793] inet_sendmsg+0x4c/0x8c
[ 128.527116] __sock_sendmsg+0x48/0x80
[ 128.531609] __sys_sendto+0x124/0x164
[ 128.536099] __arm64_sys_sendto+0x30/0x5c
[ 128.540935] invoke_syscall+0x50/0x130
[ 128.545508] el0_svc_common.constprop.0+0x10c/0x124
[ 128.551205] do_el0_svc+0x34/0xdc
[ 128.555347] el0_svc+0x20/0x30
[ 128.559227] el0_sync_handler+0xb8/0xc0
[ 128.563883] el0_sync+0x160/0x180 | null | 2025-01-19T00:00:00+00:00 | 2025-01-19T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Will not fix",
"Affected"
] | [
null,
null
] |
CVE-2025-1119 | null | Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.8.5 - Unauthenticated Arbitrary Shortcode Execution | null | null | null | The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-27637 | null | CVE-2025-27637 | null | null | null | Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows Cross-Site Scripting V-2024-016. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26925 | null | WordPress Admin Menu Manager plugin <= 1.0.3 - Cross Site Request Forgery (CSRF) vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in Required Admin Menu Manager allows Cross Site Request Forgery.This issue affects Admin Menu Manager: from n/a through 1.0.3. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-20058 | null | BIG-IP message routing vulnerability | null | null | null | When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-02-05T15:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-22570 | null | WordPress Inline Tweets plugin <= 2.0 - Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Miloš Đekić Inline Tweets allows Stored XSS.This issue affects Inline Tweets: from n/a through 2.0. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26163 | null | CVE-2025-26163 | null | null | null | CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the CPF parameter. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-23731 | null | WordPress Tax Report for WooCommerce plugin <= 2.2 - Reflected Cross Site Scripting (XSS) vulnerability | null | null | null | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in infosoftplugin Tax Report for WooCommerce allows Reflected XSS. This issue affects Tax Report for WooCommerce: from n/a through 2.2. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-2220 | null | Odyssey CMS reCAPTCHA odyssey_contact_form.php key management | null | null | null | A vulnerability was found in Odyssey CMS up to 10.34. It has been classified as problematic. Affected is an unknown function of the file /modules/odyssey_contact_form/odyssey_contact_form.php of the component reCAPTCHA Handler. The manipulation of the argument g-recaptcha-response leads to key management error. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2025-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
Dataset Card for RedHat-security-VeX
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
Dataset Details
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/
This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG.
Data is extracted and uploaded using the following script: https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser
- Curated by: Huzaifa Sidhpurwala [email protected]
- License: Creative Commons Attribution 4.0 International License
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
References
- https://www.redhat.com/en/blog/future-red-hat-security-data
- https://www.redhat.com/en/blog/vulnerability-exploitability-exchange-vex-beta-files-now-available
Disclaimer
This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data
- Downloads last month
- 488
Models trained or fine-tuned on huzaifas-sidhpurwala/RedHat-security-VeX
