Enterprise Linux Desktop Supplementary
by Redhat
Standard maintenance is sufficient
Enterprise Linux Desktop Supplementary has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
27.3%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 11 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2014-3566 | 3.4 | 94.0% | — |
| CVE-2016-1662 | 9.8 | 15.8% | — |
| CVE-2015-8540 | 8.8 | 13.5% | — |
| CVE-2015-1276 | 9.8 | 2.8% | — |
| CVE-2016-1665 | 6.5 | 1.6% | — |
| CVE-2016-1663 | 8.8 | 1.4% | — |
| CVE-2016-1660 | 8.8 | 1.2% | — |
| CVE-2016-1664 | 4.3 | 1.1% | — |
| CVE-2016-1661 | 8.0 | 1.0% | — |
| CVE-2016-1666 | 9.8 | 0.8% | — |
| CVE-2016-2051 | 9.8 | 0.3% | — |
20
/ 100
low-risk
Active Threat
20/50 · Moderate
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.