Action not permitted
Modal body text goes here.
CVE-2012-4557
Vulnerability from cvelistv5
Published
2012-11-30 19:00
Modified
2024-08-06 20:42
Severity ?
EPSS score ?
Summary
The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:54.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSRT101139", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2" }, { "name": "DSA-2579", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2579" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1227298" }, { "name": "oval:org.mitre.oval:def:18938", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22" }, { "name": "oval:org.mitre.oval:def:19284", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284" }, { "name": "openSUSE-SU-2013:0248", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685" }, { "name": "HPSBUX02866", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2" }, { "name": "openSUSE-SU-2013:0243", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:06:34", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSRT101139", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2" }, { "name": "DSA-2579", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2579" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1227298" }, { "name": "oval:org.mitre.oval:def:18938", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22" }, { "name": "oval:org.mitre.oval:def:19284", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284" }, { "name": "openSUSE-SU-2013:0248", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685" }, { "name": "HPSBUX02866", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2" }, { "name": "openSUSE-SU-2013:0243", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSRT101139", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2" }, { "name": "DSA-2579", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2579" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1227298", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1227298" }, { "name": "oval:org.mitre.oval:def:18938", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938" }, { "name": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22", "refsource": "CONFIRM", "url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22" }, { "name": "oval:org.mitre.oval:def:19284", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284" }, { "name": "openSUSE-SU-2013:0248", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=871685", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685" }, { "name": "HPSBUX02866", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2" }, { "name": "openSUSE-SU-2013:0243", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4557", "datePublished": "2012-11-30T19:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:42:54.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-4557\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-30T19:55:01.050\",\"lastModified\":\"2024-11-21T01:43:07.847\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_proxy_ajp en el Servidor HTTP Apache v2.2.12 por v2.2.21 coloca un nodo de trabajo en un estado de error ante la detecci\u00f3n de un tiempo de procesamiento de solicitudes demasiado elevado, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de nodos de trabajo) a trav\u00e9s de un solicitud compleja.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02B629FB-88C8-4E85-A137-28770F1E524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03550EF0-DF89-42FE-BF0E-994514EBD947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4886CCAB-6D4E-45C7-B177-2E8DBEA15531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35631AC-7C35-4F6A-A95A-3B080E5210ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CED2BA6-BE5E-4EF1-88EB-0DADD23D2EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71F4154-AD20-4EEA-9E2E-D3385C357DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B8C9DB-401E-42B3-BAED-D09A96DE9A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"062C20A0-05A0-4164-8330-DF6ADFE607F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D345BA35-93BB-406F-B5DC-86E49FB29C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED4892F-C829-4BEA-AB82-6A78F6F2426D\"}]}]}],\"references\":[{\"url\":\"http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1227298\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2579\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=871685\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136612293908376\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1227298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=871685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2013_0512
Vulnerability from csaf_redhat
Published
2013-02-20 16:18
Modified
2024-11-22 05:34
Summary
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
Notes
Topic
Updated httpd packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The httpd packages contain the Apache HTTP Server (httpd), which is the
namesake project of The Apache Software Foundation.
An input sanitization flaw was found in the mod_negotiation Apache HTTP
Server module. A remote attacker able to upload or create files with
arbitrary names in a directory that has the MultiViews options enabled,
could use this flaw to conduct cross-site scripting attacks against users
visiting the site. (CVE-2008-0455, CVE-2012-2687)
It was discovered that mod_proxy_ajp, when used in configurations with
mod_proxy in load balancer mode, would mark a back-end server as failed
when request processing timed out, even when a previous AJP (Apache JServ
Protocol) CPing request was responded to by the back-end. A remote
attacker able to make a back-end use an excessive amount of time to
process a request could cause mod_proxy to not send requests to back-end
AJP servers for the retry timeout period or until all back-end servers
were marked as failed. (CVE-2012-4557)
These updated httpd packages include numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users
are directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linked
to in the References, for information on the most significant of these
changes.
All users of httpd are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements. After installing the updated packages, the httpd daemon will
be restarted automatically.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages contain the Apache HTTP Server (httpd), which is the\nnamesake project of The Apache Software Foundation.\n\nAn input sanitization flaw was found in the mod_negotiation Apache HTTP\nServer module. A remote attacker able to upload or create files with\narbitrary names in a directory that has the MultiViews options enabled,\ncould use this flaw to conduct cross-site scripting attacks against users\nvisiting the site. (CVE-2008-0455, CVE-2012-2687)\n\nIt was discovered that mod_proxy_ajp, when used in configurations with\nmod_proxy in load balancer mode, would mark a back-end server as failed\nwhen request processing timed out, even when a previous AJP (Apache JServ\nProtocol) CPing request was responded to by the back-end. A remote\nattacker able to make a back-end use an excessive amount of time to\nprocess a request could cause mod_proxy to not send requests to back-end\nAJP servers for the retry timeout period or until all back-end servers\nwere marked as failed. (CVE-2012-4557)\n\nThese updated httpd packages include numerous bug fixes and enhancements.\nSpace precludes documenting all of these changes in this advisory. Users\nare directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linked\nto in the References, for information on the most significant of these\nchanges.\n\nAll users of httpd are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the updated packages, the httpd daemon will\nbe restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0512", "url": "https://access.redhat.com/errata/RHSA-2013:0512" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/httpd.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/httpd.html" }, { "category": "external", "summary": "757735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=757735" }, { "category": "external", "summary": "757739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=757739" }, { "category": "external", "summary": "805720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805720" }, { "category": "external", "summary": "805810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805810" }, { "category": "external", "summary": "828896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828896" }, { "category": "external", "summary": "829689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829689" }, { "category": "external", "summary": "842376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842376" }, { "category": "external", "summary": "848954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848954" }, { "category": "external", "summary": "850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "867745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867745" }, { "category": "external", "summary": "868283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868283" }, { "category": "external", "summary": "871685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685" }, { "category": "external", "summary": "876923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876923" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0512.json" } ], "title": "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:34:08+00:00", "generator": { "date": "2024-11-22T05:34:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0512", "initial_release_date": "2013-02-20T16:18:00+00:00", "revision_history": [ { "date": "2013-02-20T16:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-20T16:29:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:34:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "product_id": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-26.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-26.el6.x86_64", "product": { "name": "httpd-0:2.2.15-26.el6.x86_64", "product_id": "httpd-0:2.2.15-26.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-26.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-26.el6.x86_64", "product": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64", "product_id": "httpd-devel-0:2.2.15-26.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-26.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-26.el6.x86_64", "product": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64", "product_id": "mod_ssl-1:2.2.15-26.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-26.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-26.el6.x86_64", "product": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64", "product_id": "httpd-tools-0:2.2.15-26.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-26.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-26.el6.i686", "product": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686", "product_id": "httpd-debuginfo-0:2.2.15-26.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-26.el6?arch=i686" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-26.el6.i686", "product": { "name": "httpd-devel-0:2.2.15-26.el6.i686", "product_id": "httpd-devel-0:2.2.15-26.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-26.el6?arch=i686" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-26.el6.i686", "product": { "name": "httpd-0:2.2.15-26.el6.i686", "product_id": "httpd-0:2.2.15-26.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-26.el6?arch=i686" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-26.el6.i686", "product": { "name": "mod_ssl-1:2.2.15-26.el6.i686", "product_id": "mod_ssl-1:2.2.15-26.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-26.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-26.el6.i686", "product": { "name": "httpd-tools-0:2.2.15-26.el6.i686", "product_id": "httpd-tools-0:2.2.15-26.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-26.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.15-26.el6.noarch", "product": { "name": "httpd-manual-0:2.2.15-26.el6.noarch", "product_id": "httpd-manual-0:2.2.15-26.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-26.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-26.el6.src", "product": { "name": "httpd-0:2.2.15-26.el6.src", "product_id": "httpd-0:2.2.15-26.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-26.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "product": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "product_id": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-26.el6?arch=ppc" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-26.el6.ppc", "product": { "name": "httpd-devel-0:2.2.15-26.el6.ppc", "product_id": "httpd-devel-0:2.2.15-26.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-26.el6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "product": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "product_id": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-26.el6?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-26.el6.ppc64", "product": { "name": "httpd-0:2.2.15-26.el6.ppc64", "product_id": "httpd-0:2.2.15-26.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-26.el6?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-26.el6.ppc64", "product": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64", "product_id": "httpd-devel-0:2.2.15-26.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-26.el6?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-26.el6.ppc64", "product": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64", "product_id": "mod_ssl-1:2.2.15-26.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-26.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-26.el6.ppc64", "product": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64", "product_id": "httpd-tools-0:2.2.15-26.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-26.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "product": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "product_id": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-26.el6?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-26.el6.s390x", "product": { "name": "httpd-0:2.2.15-26.el6.s390x", "product_id": "httpd-0:2.2.15-26.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-26.el6?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-26.el6.s390x", "product": { "name": "httpd-devel-0:2.2.15-26.el6.s390x", "product_id": "httpd-devel-0:2.2.15-26.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-26.el6?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-26.el6.s390x", "product": { "name": "mod_ssl-1:2.2.15-26.el6.s390x", "product_id": "mod_ssl-1:2.2.15-26.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-26.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-26.el6.s390x", "product": { "name": "httpd-tools-0:2.2.15-26.el6.s390x", "product_id": "httpd-tools-0:2.2.15-26.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-26.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-26.el6.s390", "product": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390", "product_id": "httpd-debuginfo-0:2.2.15-26.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-26.el6?arch=s390" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-26.el6.s390", "product": { "name": "httpd-devel-0:2.2.15-26.el6.s390", "product_id": "httpd-devel-0:2.2.15-26.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-26.el6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-0:2.2.15-26.el6.src" }, "product_reference": "httpd-0:2.2.15-26.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-26.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch" }, "product_reference": "httpd-manual-0:2.2.15-26.el6.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-0:2.2.15-26.el6.src" }, "product_reference": "httpd-0:2.2.15-26.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-devel-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-devel-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-devel-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-devel-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-devel-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-devel-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-26.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-manual-0:2.2.15-26.el6.noarch" }, "product_reference": "httpd-manual-0:2.2.15-26.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-tools-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-tools-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-tools-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:httpd-tools-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:mod_ssl-1:2.2.15-26.el6.i686" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:mod_ssl-1:2.2.15-26.el6.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:mod_ssl-1:2.2.15-26.el6.s390x" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:mod_ssl-1:2.2.15-26.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src" }, "product_reference": "httpd-0:2.2.15-26.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-26.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch" }, "product_reference": "httpd-manual-0:2.2.15-26.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-0:2.2.15-26.el6.src" }, "product_reference": "httpd-0:2.2.15-26.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-26.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch" }, "product_reference": "httpd-manual-0:2.2.15-26.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-0:2.2.15-26.el6.src" }, "product_reference": "httpd-0:2.2.15-26.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-devel-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-devel-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-devel-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-devel-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-devel-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-devel-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-26.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-manual-0:2.2.15-26.el6.noarch" }, "product_reference": "httpd-manual-0:2.2.15-26.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-tools-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-tools-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-tools-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:httpd-tools-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_ssl-1:2.2.15-26.el6.i686" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_ssl-1:2.2.15-26.el6.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_ssl-1:2.2.15-26.el6.s390x" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_ssl-1:2.2.15-26.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-0:2.2.15-26.el6.src" }, "product_reference": "httpd-0:2.2.15-26.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-devel-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-devel-0:2.2.15-26.el6.s390" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-26.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch" }, "product_reference": "httpd-manual-0:2.2.15-26.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-tools-0:2.2.15-26.el6.i686" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_ssl-1:2.2.15-26.el6.i686" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-26.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-26.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0455", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0455" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0455", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-20T16:18:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0512" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2012-2687", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2687" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-20T16:18:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0512" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2012-4557", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "871685" } ], "notes": [ { "category": "description", "text": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4557" }, { "category": "external", "summary": "RHBZ#871685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4557", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-20T16:18:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0512" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:httpd-0:2.2.15-26.el6.i686", "6Client-optional:httpd-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-0:2.2.15-26.el6.src", "6Client-optional:httpd-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.i686", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6Client-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390", "6Client-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6Client-optional:httpd-tools-0:2.2.15-26.el6.i686", "6Client-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6Client-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.i686", "6Client-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6Client-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6Client:httpd-0:2.2.15-26.el6.i686", "6Client:httpd-0:2.2.15-26.el6.ppc64", "6Client:httpd-0:2.2.15-26.el6.s390x", "6Client:httpd-0:2.2.15-26.el6.src", "6Client:httpd-0:2.2.15-26.el6.x86_64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Client:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Client:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Client:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Client:httpd-devel-0:2.2.15-26.el6.i686", "6Client:httpd-devel-0:2.2.15-26.el6.ppc", "6Client:httpd-devel-0:2.2.15-26.el6.ppc64", "6Client:httpd-devel-0:2.2.15-26.el6.s390", "6Client:httpd-devel-0:2.2.15-26.el6.s390x", "6Client:httpd-devel-0:2.2.15-26.el6.x86_64", "6Client:httpd-manual-0:2.2.15-26.el6.noarch", "6Client:httpd-tools-0:2.2.15-26.el6.i686", "6Client:httpd-tools-0:2.2.15-26.el6.ppc64", "6Client:httpd-tools-0:2.2.15-26.el6.s390x", "6Client:httpd-tools-0:2.2.15-26.el6.x86_64", "6Client:mod_ssl-1:2.2.15-26.el6.i686", "6Client:mod_ssl-1:2.2.15-26.el6.ppc64", "6Client:mod_ssl-1:2.2.15-26.el6.s390x", "6Client:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.src", "6ComputeNode-optional:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode-optional:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode-optional:mod_ssl-1:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-0:2.2.15-26.el6.src", "6ComputeNode:httpd-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-devel-0:2.2.15-26.el6.x86_64", "6ComputeNode:httpd-manual-0:2.2.15-26.el6.noarch", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.i686", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.ppc64", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.s390x", "6ComputeNode:httpd-tools-0:2.2.15-26.el6.x86_64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.i686", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.ppc64", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.s390x", "6ComputeNode:mod_ssl-1:2.2.15-26.el6.x86_64", "6Server:httpd-0:2.2.15-26.el6.i686", "6Server:httpd-0:2.2.15-26.el6.ppc64", "6Server:httpd-0:2.2.15-26.el6.s390x", "6Server:httpd-0:2.2.15-26.el6.src", "6Server:httpd-0:2.2.15-26.el6.x86_64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Server:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Server:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Server:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Server:httpd-devel-0:2.2.15-26.el6.i686", "6Server:httpd-devel-0:2.2.15-26.el6.ppc", "6Server:httpd-devel-0:2.2.15-26.el6.ppc64", "6Server:httpd-devel-0:2.2.15-26.el6.s390", "6Server:httpd-devel-0:2.2.15-26.el6.s390x", "6Server:httpd-devel-0:2.2.15-26.el6.x86_64", "6Server:httpd-manual-0:2.2.15-26.el6.noarch", "6Server:httpd-tools-0:2.2.15-26.el6.i686", "6Server:httpd-tools-0:2.2.15-26.el6.ppc64", "6Server:httpd-tools-0:2.2.15-26.el6.s390x", "6Server:httpd-tools-0:2.2.15-26.el6.x86_64", "6Server:mod_ssl-1:2.2.15-26.el6.i686", "6Server:mod_ssl-1:2.2.15-26.el6.ppc64", "6Server:mod_ssl-1:2.2.15-26.el6.s390x", "6Server:mod_ssl-1:2.2.15-26.el6.x86_64", "6Workstation:httpd-0:2.2.15-26.el6.i686", "6Workstation:httpd-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-0:2.2.15-26.el6.s390x", "6Workstation:httpd-0:2.2.15-26.el6.src", "6Workstation:httpd-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.i686", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.s390x", "6Workstation:httpd-debuginfo-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-devel-0:2.2.15-26.el6.i686", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc", "6Workstation:httpd-devel-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390", "6Workstation:httpd-devel-0:2.2.15-26.el6.s390x", "6Workstation:httpd-devel-0:2.2.15-26.el6.x86_64", "6Workstation:httpd-manual-0:2.2.15-26.el6.noarch", "6Workstation:httpd-tools-0:2.2.15-26.el6.i686", "6Workstation:httpd-tools-0:2.2.15-26.el6.ppc64", "6Workstation:httpd-tools-0:2.2.15-26.el6.s390x", "6Workstation:httpd-tools-0:2.2.15-26.el6.x86_64", "6Workstation:mod_ssl-1:2.2.15-26.el6.i686", "6Workstation:mod_ssl-1:2.2.15-26.el6.ppc64", "6Workstation:mod_ssl-1:2.2.15-26.el6.s390x", "6Workstation:mod_ssl-1:2.2.15-26.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded" } ] }
rhsa-2011_0896
Vulnerability from csaf_redhat
Published
2011-06-22 23:14
Modified
2024-11-22 04:47
Summary
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
Notes
Topic
JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat
Customer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and
Microsoft Windows.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise Web Server is a fully-integrated and certified set of
components for hosting Java web applications.
This is the first release of JBoss Enterprise Web Server for Red Hat
Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and
Microsoft Windows, this release serves as a replacement for JBoss
Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to
the Release Notes, linked in the References, for more information.
This update corrects security flaws in the following components:
tomcat6:
A cross-site scripting (XSS) flaw was found in the Manager application,
used for managing web applications on Apache Tomcat. If a remote attacker
could trick a user who is logged into the Manager application into visiting
a specially-crafted URL, the attacker could perform Manager application
tasks with the privileges of the logged in user. (CVE-2010-4172)
tomcat5 and tomcat6:
It was found that web applications could modify the location of the Apache
Tomcat host's work directory. As web applications deployed on Tomcat have
read and write access to this directory, a malicious web application could
use this flaw to trick Tomcat into giving it read and write access to an
arbitrary directory on the file system. (CVE-2010-3718)
A second cross-site scripting (XSS) flaw was found in the Manager
application. A malicious web application could use this flaw to conduct an
XSS attack, leading to arbitrary web script execution with the privileges
of victims who are logged into and viewing Manager application web pages.
(CVE-2011-0013)
A possible minor information leak was found in the way Apache Tomcat
generated HTTP BASIC and DIGEST authentication requests. For configurations
where a realm name was not specified and Tomcat was accessed via a proxy,
the default generated realm contained the hostname and port used by the
proxy to send requests to the Tomcat server. (CVE-2010-1157)
httpd:
A flaw was found in the way the mod_dav module of the Apache HTTP Server
handled certain requests. If a remote attacker were to send a carefully
crafted request to the server, it could cause the httpd child process to
crash. (CVE-2010-1452)
A flaw was discovered in the way the mod_proxy_http module of the Apache
HTTP Server handled the timeouts of requests forwarded by a reverse proxy
to the back-end server. In some configurations, the proxy could return
a response intended for another user under certain timeout conditions,
possibly leading to information disclosure. Note: This issue only affected
httpd running on the Windows operating system. (CVE-2010-2068)
apr:
It was found that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker could
use this flaw to cause an application using this function, which also
accepted untrusted input as a pattern for matching (such as an httpd server
using the mod_autoindex module), to exhaust all stack memory or use an
excessive amount of CPU time when performing matching. (CVE-2011-0419)
apr-util:
It was found that certain input could cause the apr-util library to
allocate more memory than intended in the apr_brigade_split_line()
function. An attacker able to provide input in small chunks to an
application using the apr-util library (such as httpd) could possibly use
this flaw to trigger high memory consumption. (CVE-2010-1623)
The following flaws were corrected in the packages for Solaris and Windows.
Updates for Red Hat Enterprise Linux can be downloaded from the Red Hat
Network.
Multiple flaws in OpenSSL, which could possibly cause a crash, code
execution, or a change of session parameters, have been corrected.
(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)
Two denial of service flaws were corrected in Expat. (CVE-2009-3560,
CVE-2009-3720)
An X.509 certificate verification flaw was corrected in OpenLDAP.
(CVE-2009-3767)
More information about these flaws is available from the CVE links in the
References.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host\u0027s work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the \u0027*\u0027 wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0896", "url": "https://access.redhat.com/errata/RHSA-2011:0896" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", "url": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2" }, { "category": "external", "summary": "530715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715" }, { "category": "external", "summary": "531697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697" }, { "category": "external", "summary": "533174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174" }, { "category": "external", "summary": "570924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924" }, { "category": "external", "summary": "585331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331" }, { "category": "external", "summary": "618189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189" }, { "category": "external", "summary": "632994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994" }, { "category": "external", "summary": "640281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281" }, { "category": "external", "summary": "656246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246" }, { "category": "external", "summary": "659462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462" }, { "category": "external", "summary": "660650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650" }, { "category": "external", "summary": "675786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786" }, { "category": "external", "summary": "675792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792" }, { "category": "external", "summary": "703390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update", "tracking": { "current_release_date": "2024-11-22T04:47:58+00:00", "generator": { "date": "2024-11-22T04:47:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0896", "initial_release_date": "2011-06-22T23:14:00+00:00", "revision_history": [ { "date": "2011-06-22T23:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-22T19:16:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:47:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0", "product": { "name": "Red Hat JBoss Web Server 1.0", "product_id": "Red Hat JBoss Web Server 1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-7270", "discovery_date": "2010-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "660650" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-7270" }, { "category": "external", "summary": "RHBZ#660650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270", "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270" } ], "release_date": "2010-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack" }, { "cve": "CVE-2009-3245", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2010-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "570924" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: missing bn_wexpand return value checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3245" }, { "category": "external", "summary": "RHBZ#570924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245" } ], "release_date": "2010-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: missing bn_wexpand return value checks" }, { "cve": "CVE-2009-3560", "discovery_date": "2009-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533174" } ], "notes": [ { "category": "description", "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3560" }, { "category": "external", "summary": "RHBZ#533174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560" } ], "release_date": "2009-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences" }, { "cve": "CVE-2009-3720", "discovery_date": "2009-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "531697" } ], "notes": [ { "category": "description", "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3720" }, { "category": "external", "summary": "RHBZ#531697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720" } ], "release_date": "2009-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences" }, { "cve": "CVE-2009-3767", "discovery_date": "2009-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530715" } ], "notes": [ { "category": "description", "text": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3767" }, { "category": "external", "summary": "RHBZ#530715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3767", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767" } ], "release_date": "2009-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name" }, { "cve": "CVE-2010-1157", "discovery_date": "2010-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "585331" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server\u0027s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure in authentication headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1157" }, { "category": "external", "summary": "RHBZ#585331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1157", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157" } ], "release_date": "2010-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: information disclosure in authentication headers" }, { "cve": "CVE-2010-1452", "discovery_date": "2010-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "618189" } ], "notes": [ { "category": "description", "text": "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1452" }, { "category": "external", "summary": "RHBZ#618189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1452", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452" } ], "release_date": "2010-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments" }, { "cve": "CVE-2010-1623", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "640281" } ], "notes": [ { "category": "description", "text": "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr-util: high memory consumption in apr_brigade_split_line()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1623" }, { "category": "external", "summary": "RHBZ#640281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1623", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623" } ], "release_date": "2010-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apr-util: high memory consumption in apr_brigade_split_line()" }, { "cve": "CVE-2010-2068", "discovery_date": "2010-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "632994" } ], "notes": [ { "category": "description", "text": "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2068" }, { "category": "external", "summary": "RHBZ#632994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068" } ], "release_date": "2010-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts" }, { "cve": "CVE-2010-3718", "discovery_date": "2011-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675792" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: file permission bypass flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3718" }, { "category": "external", "summary": "RHBZ#675792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3718", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718" } ], "release_date": "2011-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: file permission bypass flaw" }, { "cve": "CVE-2010-4172", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2010-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656246" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: cross-site-scripting vulnerability in the manager application", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4172" }, { "category": "external", "summary": "RHBZ#656246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4172", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172" } ], "release_date": "2010-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: cross-site-scripting vulnerability in the manager application" }, { "cve": "CVE-2010-4180", "discovery_date": "2010-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "659462" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4180" }, { "category": "external", "summary": "RHBZ#659462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180" } ], "release_date": "2010-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack" }, { "cve": "CVE-2011-0013", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675786" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: XSS vulnerability in HTML Manager interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0013" }, { "category": "external", "summary": "RHBZ#675786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0013", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0013" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013" } ], "release_date": "2011-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: XSS vulnerability in HTML Manager interface" }, { "acknowledgments": [ { "names": [ "Maksymilian Arciemowicz" ] } ], "cve": "CVE-2011-0419", "discovery_date": "2011-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "703390" } ], "notes": [ { "category": "description", "text": "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: unconstrained recursion in apr_fnmatch", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0419" }, { "category": "external", "summary": "RHBZ#703390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419" } ], "release_date": "2011-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" }, { "category": "workaround", "details": "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient", "product_ids": [ "Red Hat JBoss Web Server 1.0" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apr: unconstrained recursion in apr_fnmatch" }, { "cve": "CVE-2012-4557", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "871685" } ], "notes": [ { "category": "description", "text": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4557" }, { "category": "external", "summary": "RHBZ#871685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4557", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:14:00+00:00", "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0896" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded" } ] }
rhsa-2011_0897
Vulnerability from csaf_redhat
Published
2011-06-22 23:31
Modified
2024-11-22 04:48
Summary
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
Notes
Topic
JBoss Enterprise Web Server 1.0.2 is now available for Red Hat Enterprise
Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise Web Server is a fully-integrated and certified set of
components for hosting Java web applications.
This is the first release of JBoss Enterprise Web Server for Red Hat
Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, this release
serves as a replacement for JBoss Enterprise Web Server 1.0.1, and includes
a number of bug fixes. Refer to the Release Notes, linked in the
References, for more information.
This update corrects security flaws in the following components:
tomcat6:
A cross-site scripting (XSS) flaw was found in the Manager application,
used for managing web applications on Apache Tomcat. If a remote attacker
could trick a user who is logged into the Manager application into visiting
a specially-crafted URL, the attacker could perform Manager application
tasks with the privileges of the logged in user. (CVE-2010-4172)
tomcat5 and tomcat6:
It was found that web applications could modify the location of the Apache
Tomcat host's work directory. As web applications deployed on Tomcat have
read and write access to this directory, a malicious web application could
use this flaw to trick Tomcat into giving it read and write access to an
arbitrary directory on the file system. (CVE-2010-3718)
A second cross-site scripting (XSS) flaw was found in the Manager
application. A malicious web application could use this flaw to conduct an
XSS attack, leading to arbitrary web script execution with the privileges
of victims who are logged into and viewing Manager application web pages.
(CVE-2011-0013)
A possible minor information leak was found in the way Apache Tomcat
generated HTTP BASIC and DIGEST authentication requests. For configurations
where a realm name was not specified and Tomcat was accessed via a proxy,
the default generated realm contained the hostname and port used by the
proxy to send requests to the Tomcat server. (CVE-2010-1157)
httpd:
A flaw was found in the way the mod_dav module of the Apache HTTP Server
handled certain requests. If a remote attacker were to send a carefully
crafted request to the server, it could cause the httpd child process to
crash. (CVE-2010-1452)
apr:
It was found that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker could
use this flaw to cause an application using this function, which also
accepted untrusted input as a pattern for matching (such as an httpd server
using the mod_autoindex module), to exhaust all stack memory or use an
excessive amount of CPU time when performing matching. (CVE-2011-0419)
apr-util:
It was found that certain input could cause the apr-util library to
allocate more memory than intended in the apr_brigade_split_line()
function. An attacker able to provide input in small chunks to an
application using the apr-util library (such as httpd) could possibly use
this flaw to trigger high memory consumption. Note: This issue only
affected the JBoss Enterprise Web Server packages on Red Hat Enterprise
Linux 4. (CVE-2010-1623)
All users of JBoss Enterprise Web Server 1.0.1 are advised to upgrade to
JBoss Enterprise Web Server 1.0.2, which corrects these issues. After
installing this update, the relevant Apache Tomcat service ("tomcat5" or
"tomcat6") and the Apache HTTP Server ("httpd") must be restarted for the
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Enterprise Web Server 1.0.2 is now available for Red Hat Enterprise\nLinux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, this release\nserves as a replacement for JBoss Enterprise Web Server 1.0.1, and includes\na number of bug fixes. Refer to the Release Notes, linked in the\nReferences, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host\u0027s work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the \u0027*\u0027 wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. Note: This issue only\naffected the JBoss Enterprise Web Server packages on Red Hat Enterprise\nLinux 4. (CVE-2010-1623)\n\nAll users of JBoss Enterprise Web Server 1.0.1 are advised to upgrade to\nJBoss Enterprise Web Server 1.0.2, which corrects these issues. After\ninstalling this update, the relevant Apache Tomcat service (\"tomcat5\" or\n\"tomcat6\") and the Apache HTTP Server (\"httpd\") must be restarted for the\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0897", "url": "https://access.redhat.com/errata/RHSA-2011:0897" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", "url": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html" }, { "category": "external", "summary": "585331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331" }, { "category": "external", "summary": "618189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189" }, { "category": "external", "summary": "640281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281" }, { "category": "external", "summary": "656246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246" }, { "category": "external", "summary": "675786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786" }, { "category": "external", "summary": "675792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792" }, { "category": "external", "summary": "677655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677655" }, { "category": "external", "summary": "677657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677657" }, { "category": "external", "summary": "677659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677659" }, { "category": "external", "summary": "703390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0897.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update", "tracking": { "current_release_date": "2024-11-22T04:48:02+00:00", "generator": { "date": "2024-11-22T04:48:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0897", "initial_release_date": "2011-06-22T23:31:00+00:00", "revision_history": [ { "date": "2011-06-22T23:31:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-22T19:38:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:48:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64", "product": { "name": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64", "product_id": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.31-1.1.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64", "product": { "name": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64", "product_id": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.31-1.1.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64", "product": { "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64", "product_id": "tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.1.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64", "product": { "name": "mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64", "product_id": "mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-11.1.ep5.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64", "product": { "name": "httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64", "product_id": "httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-11.1.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64", "product": { "name": "httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64", "product_id": "httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-11.1.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-11.1.ep5.el5.x86_64", "product": { "name": "httpd-0:2.2.17-11.1.ep5.el5.x86_64", "product_id": "httpd-0:2.2.17-11.1.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-11.1.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64", "product": { "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64", "product_id": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.1.GA_CP01.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "product": { "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "product_id": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.31-1.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "product": { "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "product_id": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.31-1.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "product": { "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "product_id": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.31-1.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "product": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "product_id": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.0.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "product_id": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.20-2.0.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "product": { "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "product_id": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc-debuginfo@1.0.5-1.4.ep5.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-devel@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "product": { "name": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "product_id": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl22@2.2.17-14.ep5.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-manual@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd22-0:2.2.17-14.ep5.el4.x86_64", "product": { "name": "httpd22-0:2.2.17-14.ep5.el4.x86_64", "product_id": "httpd22-0:2.2.17-14.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22@2.2.17-14.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "product": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "product_id": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.GA_CP01.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "product": { "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "product_id": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.0.10-2.GA_CP01.ep5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64", "product": { "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64", "product_id": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.1.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64", "product": { "name": "httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64", "product_id": "httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-11.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64", "product": { "name": "httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64", "product_id": "httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-11.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64", "product": { "name": "httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64", "product_id": "httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.17-11.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64", "product": { "name": "mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64", "product_id": "mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-11.2.ep5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-11.2.ep5.el6.x86_64", "product": { "name": "httpd-0:2.2.17-11.2.ep5.el6.x86_64", "product_id": "httpd-0:2.2.17-11.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-11.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64", "product": { "name": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64", "product_id": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.31-1.1.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64", "product": { "name": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64", "product_id": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.31-1.1.2.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64", "product": { "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64", "product_id": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.1.1.GA_CP01.ep5.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386", "product": { "name": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386", "product_id": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.31-1.1.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386", "product": { "name": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386", "product_id": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.31-1.1.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.i386", "product": { "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.i386", "product_id": "tomcat-native-0:1.1.20-2.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.1.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-11.1.ep5.el5.i386", "product": { "name": "mod_ssl-1:2.2.17-11.1.ep5.el5.i386", "product_id": "mod_ssl-1:2.2.17-11.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-11.1.ep5.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-11.1.ep5.el5.i386", "product": { "name": "httpd-devel-0:2.2.17-11.1.ep5.el5.i386", "product_id": "httpd-devel-0:2.2.17-11.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-11.1.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.17-11.1.ep5.el5.i386", "product": { "name": "httpd-manual-0:2.2.17-11.1.ep5.el5.i386", "product_id": "httpd-manual-0:2.2.17-11.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-11.1.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-11.1.ep5.el5.i386", "product": { "name": "httpd-0:2.2.17-11.1.ep5.el5.i386", "product_id": "httpd-0:2.2.17-11.1.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-11.1.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386", "product": { "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386", "product_id": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.1.GA_CP01.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "product": { "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "product_id": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.31-1.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "product": { "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "product_id": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.31-1.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "product": { "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "product_id": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.31-1.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "product": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "product_id": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.0.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "product": { "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "product_id": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.20-2.0.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "product": { "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "product_id": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc-debuginfo@1.0.5-1.4.ep5.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd22-devel-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-devel-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-devel-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-devel@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl22-1:2.2.17-14.ep5.el4.i386", "product": { "name": "mod_ssl22-1:2.2.17-14.ep5.el4.i386", "product_id": "mod_ssl22-1:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl22@2.2.17-14.ep5.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd22-manual-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-manual-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-manual-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-manual@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "httpd22-apr-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-apr-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-apr-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22-apr@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "httpd22-0:2.2.17-14.ep5.el4.i386", "product": { "name": "httpd22-0:2.2.17-14.ep5.el4.i386", "product_id": "httpd22-0:2.2.17-14.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22@2.2.17-14.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "product": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "product_id": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.GA_CP01.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "product": { "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "product_id": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.0.10-2.GA_CP01.ep5.el4?arch=i386" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386", "product": { "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386", "product_id": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.1.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-11.2.ep5.el6.i386", "product": { "name": "httpd-devel-0:2.2.17-11.2.ep5.el6.i386", "product_id": "httpd-devel-0:2.2.17-11.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-11.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.17-11.2.ep5.el6.i386", "product": { "name": "httpd-manual-0:2.2.17-11.2.ep5.el6.i386", "product_id": "httpd-manual-0:2.2.17-11.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-11.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.17-11.2.ep5.el6.i386", "product": { "name": "httpd-tools-0:2.2.17-11.2.ep5.el6.i386", "product_id": "httpd-tools-0:2.2.17-11.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.17-11.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-11.2.ep5.el6.i386", "product": { "name": "mod_ssl-1:2.2.17-11.2.ep5.el6.i386", "product_id": "mod_ssl-1:2.2.17-11.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-11.2.ep5.el6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-11.2.ep5.el6.i386", "product": { "name": "httpd-0:2.2.17-11.2.ep5.el6.i386", "product_id": "httpd-0:2.2.17-11.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-11.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386", "product": { "name": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386", "product_id": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.31-1.1.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386", "product": { "name": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386", "product_id": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.31-1.1.2.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386", "product": { "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386", "product_id": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.1.1.GA_CP01.ep5.el6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mod_jk-0:1.2.31-1.1.ep5.el5.src", "product": { "name": "mod_jk-0:1.2.31-1.1.ep5.el5.src", "product_id": "mod_jk-0:1.2.31-1.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk@1.2.31-1.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.src", "product": { "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.src", "product_id": "tomcat-native-0:1.1.20-2.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src", "product": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src", "product_id": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.2.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src", "product": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src", "product_id": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.2.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src", "product": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src", "product_id": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-jdk@2.1.2-1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src", "product": { "name": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src", "product_id": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons@1.3.04-7.10.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.3.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool@1.3-11.2.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging@1.1.1-0.4.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src", "product_id": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.3.2.1.1.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src", "product": { "name": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src", "product_id": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.2.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src", "product_id": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-4.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src", "product": { "name": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src", "product_id": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.3.1.1-3.1.1.1.jdk6.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src", "product": { "name": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src", "product_id": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.1.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "ant-0:1.7.1-13.jdk6.ep5.el5.src", "product": { "name": "ant-0:1.7.1-13.jdk6.ep5.el5.src", "product_id": "ant-0:1.7.1-13.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant@1.7.1-13.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.8.0-4.1.2.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-codec@1.3-9.2.1.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-8.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src", "product": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src", "product_id": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon@1.0.5-1.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-1.2.1.jdk6.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-common-core-0:2.2.17-1.ep5.el5.src", "product": { "name": "jboss-common-core-0:2.2.17-1.ep5.el5.src", "product_id": "jboss-common-core-0:2.2.17-1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-core@2.2.17-1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src", "product": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src", "product_id": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-spi@2.1.2-1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src", "product": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src", "product_id": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jkstatus-ant@1.2.31-2.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src", "product": { "name": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src", "product_id": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cglib@2.2-5.1.1.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src", "product_id": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.2.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src", "product": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src", "product_id": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/objectweb-asm@3.1-5.3.1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "javassist-0:3.12.0-1.jdk6.ep5.el5.src", "product": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el5.src", "product_id": "javassist-0:3.12.0-1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.12.0-1.jdk6.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src", "product": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src", "product_id": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api@1.0.2-3.1.jdk6.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src", "product": { "name": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src", "product_id": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.4.0-3.2.GA_CP04.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src", "product": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src", "product_id": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.4.0-4.3.GA_CP04.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src", "product": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src", "product_id": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.5.2.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src", "product": { "name": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src", "product_id": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-taglibs-standard@1.1.1-9.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-11.ep5.el5.src", "product": { "name": "dom4j-0:1.6.1-11.ep5.el5.src", "product_id": "dom4j-0:1.6.1-11.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-11.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src", "product": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src", "product_id": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-3.patch01.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src", "product": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src", "product_id": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xalan-j2@2.7.1-5.3_patch_04.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "antlr-0:2.7.7-7.ep5.el5.src", "product": { "name": "antlr-0:2.7.7-7.ep5.el5.src", "product_id": "antlr-0:2.7.7-7.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/antlr@2.7.7-7.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src", "product": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src", "product_id": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.4.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-javaee-0:5.0.1-2.9.ep5.el5.src", "product": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el5.src", "product_id": "jboss-javaee-0:5.0.1-2.9.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.9.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-11.1.ep5.el5.src", "product": { "name": "httpd-0:2.2.17-11.1.ep5.el5.src", "product_id": "httpd-0:2.2.17-11.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-11.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src", "product": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src", "product_id": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp@1.2.1-16.4.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "struts12-0:1.2.9-3.1.ep5.el5.src", "product": { "name": "struts12-0:1.2.9-3.1.ep5.el5.src", "product_id": "struts12-0:1.2.9-3.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/struts12@1.2.9-3.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src", "product": { "name": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src", "product_id": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.3.2-1.4.GA_CP04.ep5.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src", "product": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src", "product_id": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@3.1.0-1.8.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.src", "product": { "name": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.src", "product_id": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.33-16_patch_04.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "product": { "name": "mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "product_id": "mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.0.10-2.1.GA_CP01.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src", "product": { "name": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src", "product_id": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.32-15.1_patch_03.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "product": { "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "product_id": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.1.GA_CP01.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "product": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "product_id": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "product": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "product_id": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "product": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "product_id": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-jdk@2.1.2-1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "product": { "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "product_id": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/log4j@1.2.14-18.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "product": { "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "product_id": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/regexp@1.5-1.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "mod_jk-0:1.2.31-1.ep5.el4.src", "product": { "name": "mod_jk-0:1.2.31-1.ep5.el4.src", "product_id": "mod_jk-0:1.2.31-1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk@1.2.31-1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.src", "product": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.src", "product_id": "tomcat-native-0:1.1.20-2.0.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.0.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "struts12-0:1.2.9-3.ep5.el4.src", "product": { "name": "struts12-0:1.2.9-3.ep5.el4.src", "product_id": "struts12-0:1.2.9-3.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/struts12@1.2.9-3.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.8.0-4.1.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-codec@1.3-9.1.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-8.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging@1.1.1-0.4.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.3.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "product_id": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.3.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool@1.3-11.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "product_id": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-el@1.0-19.2.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "product": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "product_id": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon@1.0.5-1.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "product_id": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-4.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "product": { "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "product_id": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-launcher@1.1-4.6.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "product": { "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "product_id": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.2.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "product": { "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "product_id": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-6.1.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "product": { "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "product_id": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "product": { "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "product_id": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj@3.3.1.1-3.2.2.jdk6.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ant-0:1.7.1-13.jdk6.ep5.el4.src", "product": { "name": "ant-0:1.7.1-13.jdk6.ep5.el4.src", "product_id": "ant-0:1.7.1-13.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant@1.7.1-13.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "product": { "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "product_id": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0.4.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-1.1.1.jdk6.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-common-core-0:2.2.17-1.ep5.el4.src", "product": { "name": "jboss-common-core-0:2.2.17-1.ep5.el4.src", "product_id": "jboss-common-core-0:2.2.17-1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-core@2.2.17-1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "product": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "product_id": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-spi@2.1.2-1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "product": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "product_id": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jkstatus-ant@1.2.31-2.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.src", "product": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.src", "product_id": "javassist-0:3.12.0-1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.12.0-1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "product": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "product_id": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api@1.0.2-3.jdk6.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "product": { "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "product_id": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cglib@2.2-5.1.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "product_id": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.2.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "product": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "product_id": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/objectweb-asm@3.1-5.3.1.jdk6.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "product": { "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "product_id": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.4.0-3.3.GA_CP04.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "product": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "product_id": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.4.0-4.3.GA_CP04.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "product": { "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "product_id": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.5.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "product": { "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "product_id": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-4.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "product": { "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "product_id": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-taglibs-standard@1.1.1-9.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-11.ep5.el4.src", "product": { "name": "dom4j-0:1.6.1-11.ep5.el4.src", "product_id": "dom4j-0:1.6.1-11.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-11.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "xml-commons-1:1.3.04-7.12.ep5.el4.src", "product": { "name": "xml-commons-1:1.3.04-7.12.ep5.el4.src", "product_id": "xml-commons-1:1.3.04-7.12.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons@1.3.04-7.12.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "product": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "product_id": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-3.patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "bcel-0:5.2-8.1.ep5.el4.src", "product": { "name": "bcel-0:5.2-8.1.ep5.el4.src", "product_id": "bcel-0:5.2-8.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bcel@5.2-8.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "product": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "product_id": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xalan-j2@2.7.1-5.3_patch_04.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "product": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "product_id": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.4.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "antlr-0:2.7.7-7.ep5.el4.src", "product": { "name": "antlr-0:2.7.7-7.ep5.el4.src", "product_id": "antlr-0:2.7.7-7.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/antlr@2.7.7-7.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "product": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "product_id": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.9.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.src", "product": { "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.src", "product_id": "mx4j-1:3.0.1-9.3.4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mx4j@3.0.1-9.3.4.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "product": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "product_id": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp@1.2.1-16.4.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "product": { "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "product_id": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.3.2-1.5.GA_CP04.ep5.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "product": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "product_id": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@3.1.0-1.8.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "httpd22-0:2.2.17-14.ep5.el4.src", "product": { "name": "httpd22-0:2.2.17-14.ep5.el4.src", "product_id": "httpd22-0:2.2.17-14.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd22@2.2.17-14.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "product": { "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "product_id": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.32-15_patch_03.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "product": { "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "product_id": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.33-14_patch_04.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "product": { "name": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "product_id": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.0.10-2.GA_CP01.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "product": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "product_id": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.GA_CP01.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src", "product": { "name": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src", "product_id": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.1.4.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.src", "product_id": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-4.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.src", "product": { "name": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.src", "product_id": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging@1.1.1-1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-pool-0:1.3-15.ep5.el6.src", "product": { "name": "jakarta-commons-pool-0:1.3-15.ep5.el6.src", "product_id": "jakarta-commons-pool-0:1.3-15.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool@1.3-15.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src", "product": { "name": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src", "product_id": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon@1.0.5-1.1.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src", "product": { "name": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src", "product_id": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.8.0-9.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src", "product": { "name": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src", "product_id": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-8.1.1.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src", "product": { "name": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src", "product_id": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp@1.2.1-16.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src", "product": { "name": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src", "product_id": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-1.2.2.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src", "product": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src", "product_id": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.5.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.src", "product": { "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.src", "product_id": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.20-2.1.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src", "product": { "name": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src", "product_id": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-8.patch01.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src", "product": { "name": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src", "product_id": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.2.1.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.2.2.ep5.el6.src", "product": { "name": "jcommon-0:1.0.16-1.2.2.ep5.el6.src", "product_id": "jcommon-0:1.0.16-1.2.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.2.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "ecj3-1:3.3.1.1-4.ep5.el6.src", "product": { "name": "ecj3-1:3.3.1.1-4.ep5.el6.src", "product_id": "ecj3-1:3.3.1.1-4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.3.1.1-4.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ant-0:1.7.1-14.ep5.el6.src", "product": { "name": "ant-0:1.7.1-14.ep5.el6.src", "product_id": "ant-0:1.7.1-14.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant@1.7.1-14.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src", "product": { "name": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src", "product_id": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.2.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "struts12-0:1.2.9-3.1.ep5.el6.src", "product": { "name": "struts12-0:1.2.9-3.1.ep5.el6.src", "product_id": "struts12-0:1.2.9-3.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/struts12@1.2.9-3.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-common-core-0:2.2.17-1.2.ep5.el6.src", "product": { "name": "jboss-common-core-0:2.2.17-1.2.ep5.el6.src", "product_id": "jboss-common-core-0:2.2.17-1.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-core@2.2.17-1.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src", "product": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src", "product_id": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-spi@2.1.2-1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src", "product": { "name": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src", "product_id": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-jdk@2.1.2-1.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-javaee-0:5.0.1-2.9.ep5.el6.src", "product": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el6.src", "product_id": "jboss-javaee-0:5.0.1-2.9.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.9.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "xml-commons-0:1.3.04-7.14.ep5.el6.src", "product": { "name": "xml-commons-0:1.3.04-7.14.ep5.el6.src", "product_id": "xml-commons-0:1.3.04-7.14.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons@1.3.04-7.14.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-oro-0:2.0.8-7.ep5.el6.src", "product": { "name": "jakarta-oro-0:2.0.8-7.ep5.el6.src", "product_id": "jakarta-oro-0:2.0.8-7.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-7.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src", "product": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src", "product_id": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xalan-j2@2.7.1-5.3_patch_04.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src", "product": { "name": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src", "product_id": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-taglibs-standard@1.1.1-12.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src", "product": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src", "product_id": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api@1.0.2-3.3.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src", "product": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src", "product_id": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@3.1.0-1.8.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "javassist-0:3.12.0-3.ep5.el6.src", "product": { "name": "javassist-0:3.12.0-3.ep5.el6.src", "product_id": "javassist-0:3.12.0-3.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.12.0-3.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src", "product_id": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.2.2.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src", "product": { "name": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src", "product_id": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.4.0-3.5.GA_CP04.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src", "product": { "name": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src", "product_id": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.4.0-4.4.GA_CP04.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-11.1.ep5.el6.src", "product": { "name": "dom4j-0:1.6.1-11.1.ep5.el6.src", "product_id": "dom4j-0:1.6.1-11.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-11.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.src", "product": { "name": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.src", "product_id": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-codec@1.3-12.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "antlr-0:2.7.7-7.ep5.el6.src", "product": { "name": "antlr-0:2.7.7-7.ep5.el6.src", "product_id": "antlr-0:2.7.7-7.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/antlr@2.7.7-7.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src", "product": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src", "product_id": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon-jsvc@1.0.5-1.4.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-io-0:1.4-4.ep5.el6.src", "product": { "name": "jakarta-commons-io-0:1.4-4.ep5.el6.src", "product_id": "jakarta-commons-io-0:1.4-4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-4.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src", "product": { "name": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src", "product_id": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.5.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src", "product": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src", "product_id": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jkstatus-ant@1.2.31-2.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-11.2.ep5.el6.src", "product": { "name": "httpd-0:2.2.17-11.2.ep5.el6.src", "product_id": "httpd-0:2.2.17-11.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-11.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "mod_jk-0:1.2.31-1.1.2.ep5.el6.src", "product": { "name": "mod_jk-0:1.2.31-1.1.2.ep5.el6.src", "product_id": "mod_jk-0:1.2.31-1.1.2.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk@1.2.31-1.1.2.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src", "product": { "name": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src", "product_id": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.3.2-1.8.GA_CP04.ep5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cglib-0:2.2-5.4.ep5.el6.src", "product": { "name": "cglib-0:2.2-5.4.ep5.el6.src", "product_id": "cglib-0:2.2-5.4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cglib@2.2-5.4.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.src", "product": { "name": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.src", "product_id": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.33-15_patch_04.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "objectweb-asm31-0:3.1-12.1.ep5.el6.src", "product": { "name": "objectweb-asm31-0:3.1-12.1.ep5.el6.src", "product_id": "objectweb-asm31-0:3.1-12.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/objectweb-asm31@3.1-12.1.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src", "product": { "name": "mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src", "product_id": "mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.0.10-2.2.GA_CP01.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src", "product": { "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src", "product_id": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-2.1.1.GA_CP01.ep5.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.src", "product": { "name": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.src", "product_id": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.32-14_patch_03.ep5.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch", "product_id": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.2.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch", "product_id": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.2.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch", "product": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch", "product_id": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-jdk@2.1.2-1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product": { "name": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_id": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.2-apis@1.3.04-7.10.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product": { "name": "xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_id": "xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.3.04-7.10.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product": { "name": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_id": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.3-apis@1.3.04-7.10.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product": { "name": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_id": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons@1.3.04-7.10.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.3.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool@1.3-11.2.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool-tomcat5@1.3-11.2.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-tomcat6@1.1.1-0.4.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging@1.1.1-0.4.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.3.2.1.1.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch", "product": { "name": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch", "product_id": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.2.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-4.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-4.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch", "product": { "name": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch", "product_id": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.3.1.1-3.1.1.1.jdk6.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch", "product_id": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.1.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-regexp@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-scripts@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-bsf@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-antlr@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-swing@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-javamail@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-jdepend@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-trax@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-resolver@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-jsch@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-bcel@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-junit@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-jmf@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-oro@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-commons-logging@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-nodeps@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch", "product": { "name": "ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_id": "ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-log4j@1.7.1-13.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.8.0-4.1.2.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-codec@1.3-9.2.1.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-8.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch", "product": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch", "product_id": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon@1.0.5-1.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-1.2.1.jdk6.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-common-core-0:2.2.17-1.ep5.el5.noarch", "product": { "name": "jboss-common-core-0:2.2.17-1.ep5.el5.noarch", "product_id": "jboss-common-core-0:2.2.17-1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-core@2.2.17-1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch", "product": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch", "product_id": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-spi@2.1.2-1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch", "product": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch", "product_id": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jkstatus-ant@1.2.31-2.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch", "product": { "name": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch", "product_id": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cglib@2.2-5.1.1.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch", "product_id": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.2.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch", "product": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch", "product_id": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/objectweb-asm@3.1-5.3.1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.12.0-1.jdk6.ep5.el5.noarch", "product": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el5.noarch", "product_id": "javassist-0:3.12.0-1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.12.0-1.jdk6.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "product": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "product_id": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api@1.0.2-3.1.jdk6.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "product": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "product_id": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api-javadoc@1.0.2-3.1.jdk6.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.4.0-3.2.GA_CP04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "product": { "name": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "product_id": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.4.0-3.2.GA_CP04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.4.0-4.3.GA_CP04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "product": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "product_id": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.4.0-4.3.GA_CP04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch", "product": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch", "product_id": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.5.2.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch", "product": { "name": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch", "product_id": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-taglibs-standard@1.1.1-9.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-11.ep5.el5.noarch", "product": { "name": "dom4j-0:1.6.1-11.ep5.el5.noarch", "product_id": "dom4j-0:1.6.1-11.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-11.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch", "product": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch", "product_id": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-3.patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch", "product": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch", "product_id": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xalan-j2@2.7.1-5.3_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "antlr-0:2.7.7-7.ep5.el5.noarch", "product": { "name": "antlr-0:2.7.7-7.ep5.el5.noarch", "product_id": "antlr-0:2.7.7-7.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/antlr@2.7.7-7.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch", "product": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch", "product_id": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.4.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch", "product": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch", "product_id": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jms-1.1-api@5.0.1-2.9.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch", "product": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch", "product_id": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee-poms@5.0.1-2.9.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch", "product": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch", "product_id": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-transaction-1.0.1-api@5.0.1-2.9.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch", "product": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch", "product_id": "jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.9.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch", "product": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch", "product_id": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp@1.2.1-16.4.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch", "product": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch", "product_id": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp-tomcat5@1.2.1-16.4.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "struts12-0:1.2.9-3.1.ep5.el5.noarch", "product": { "name": "struts12-0:1.2.9-3.1.ep5.el5.noarch", "product_id": "struts12-0:1.2.9-3.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/struts12@1.2.9-3.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "product": { "name": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "product_id": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.3.2-1.4.GA_CP04.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "product": { "name": "hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "product_id": "hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.3.2-1.4.GA_CP04.ep5.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch", "product": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch", "product_id": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@3.1.0-1.8.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch", "product": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch", "product_id": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations-javadoc@3.1.0-1.8.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "product": { "name": "tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_id": "tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.33-16_patch_04.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_id": "mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-jbossweb2@1.0.10-2.1.GA_CP01.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product": { "name": "mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_id": "mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-demo@1.0.10-2.1.GA_CP01.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product": { "name": "mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_id": "mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-jbossas@1.0.10-2.1.GA_CP01.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product": { "name": "mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_id": "mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.0.10-2.1.GA_CP01.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_id": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.32-15.1_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "product": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "product_id": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "product_id": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "product": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "product_id": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-jdk@2.1.2-1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "product": { "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "product_id": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/log4j@1.2.14-18.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "product": { "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "product_id": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/regexp@1.5-1.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "struts12-0:1.2.9-3.ep5.el4.noarch", "product": { "name": "struts12-0:1.2.9-3.ep5.el4.noarch", "product_id": "struts12-0:1.2.9-3.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/struts12@1.2.9-3.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.8.0-4.1.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-codec@1.3-9.1.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-8.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-tomcat6@1.1.1-0.4.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging@1.1.1-0.4.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.3.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.3.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool-tomcat5@1.3-11.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool@1.3-11.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-el@1.0-19.2.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "product": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "product_id": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon@1.0.5-1.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-4.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-4.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "product": { "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "product_id": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-launcher@1.1-4.6.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "product": { "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "product_id": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.2.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "product": { "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "product_id": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-6.1.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "product_id": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "product": { "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "product_id": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj@3.3.1.1-3.2.2.jdk6.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "product": { "name": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "product_id": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant@1.7.1-13.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "product": { "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "product_id": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0.4.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-1.1.1.jdk6.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "product": { "name": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "product_id": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-core@2.2.17-1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "product": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "product_id": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-spi@2.1.2-1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "product": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "product_id": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jkstatus-ant@1.2.31-2.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "product": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "product_id": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.12.0-1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "product": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "product_id": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api-javadoc@1.0.2-3.jdk6.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "product": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "product_id": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api@1.0.2-3.jdk6.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "product": { "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "product_id": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cglib@2.2-5.1.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "product_id": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.2.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "product": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "product_id": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/objectweb-asm@3.1-5.3.1.jdk6.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "product": { "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "product_id": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.4.0-3.3.GA_CP04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.4.0-3.3.GA_CP04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.4.0-4.3.GA_CP04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "product": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "product_id": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.4.0-4.3.GA_CP04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "product": { "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "product_id": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.5.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "product": { "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "product_id": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-4.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "product": { "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "product_id": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-taglibs-standard@1.1.1-9.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-11.ep5.el4.noarch", "product": { "name": "dom4j-0:1.6.1-11.ep5.el4.noarch", "product_id": "dom4j-0:1.6.1-11.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-11.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "product": { "name": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "product_id": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons@1.3.04-7.12.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "product": { "name": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "product_id": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.3-apis@1.3.04-7.12.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "product": { "name": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "product_id": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.2-apis@1.3.04-7.12.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "product": { "name": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "product_id": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.3.04-7.12.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "product": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "product_id": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-3.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "bcel-0:5.2-8.1.ep5.el4.noarch", "product": { "name": "bcel-0:5.2-8.1.ep5.el4.noarch", "product_id": "bcel-0:5.2-8.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bcel@5.2-8.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "product": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "product_id": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xalan-j2@2.7.1-5.3_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "product": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "product_id": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.4.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "antlr-0:2.7.7-7.ep5.el4.noarch", "product": { "name": "antlr-0:2.7.7-7.ep5.el4.noarch", "product_id": "antlr-0:2.7.7-7.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/antlr@2.7.7-7.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "product": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "product_id": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee-poms@5.0.1-2.9.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "product": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "product_id": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-transaction-1.0.1-api@5.0.1-2.9.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "product": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "product_id": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jms-1.1-api@5.0.1-2.9.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "product": { "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "product_id": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mx4j@3.0.1-9.3.4.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "product": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "product_id": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp@1.2.1-16.4.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "product": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "product_id": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp-tomcat5@1.2.1-16.4.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "product": { "name": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "product_id": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.3.2-1.5.GA_CP04.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "product": { "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "product_id": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.3.2-1.5.GA_CP04.ep5.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "product": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "product_id": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@3.1.0-1.8.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "product": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "product_id": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations-javadoc@3.1.0-1.8.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.32-15_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "product": { "name": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_id": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.33-14_patch_04.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product": { "name": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_id": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-jbossas@1.0.10-2.GA_CP01.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product": { "name": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_id": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-demo@1.0.10-2.GA_CP01.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_id": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-jbossweb2@1.0.10-2.GA_CP01.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product": { "name": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_id": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.0.10-2.GA_CP01.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch", "product_id": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.1.4.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-4.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-4.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch", "product": { "name": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch", "product_id": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging@1.1.1-1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch", "product": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch", "product_id": "jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-tomcat6@1.1.1-1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch", "product": { "name": "jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch", "product_id": "jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool-tomcat5@1.3-15.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-pool-0:1.3-15.ep5.el6.noarch", "product": { "name": "jakarta-commons-pool-0:1.3-15.ep5.el6.noarch", "product_id": "jakarta-commons-pool-0:1.3-15.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-pool@1.3-15.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch", "product": { "name": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch", "product_id": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-daemon@1.0.5-1.1.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch", "product": { "name": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch", "product_id": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.8.0-9.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch", "product": { "name": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch", "product_id": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-8.1.1.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch", "product": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch", "product_id": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp-tomcat5@1.2.1-16.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch", "product": { "name": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch", "product_id": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-dbcp@1.2.1-16.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch", "product": { "name": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch", "product_id": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-1.2.2.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch", "product": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch", "product_id": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.5.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch", "product": { "name": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch", "product_id": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-8.patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch", "product_id": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.2.1.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.2.2.ep5.el6.noarch", "product": { "name": "jcommon-0:1.0.16-1.2.2.ep5.el6.noarch", "product_id": "jcommon-0:1.0.16-1.2.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.2.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ecj3-1:3.3.1.1-4.ep5.el6.noarch", "product": { "name": "ecj3-1:3.3.1.1-4.ep5.el6.noarch", "product_id": "ecj3-1:3.3.1.1-4.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.3.1.1-4.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ant-commons-net-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-commons-net-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-commons-net-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-commons-net@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-resolver@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-javamail-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-javamail-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-javamail-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-javamail@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-commons-logging-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-commons-logging-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-commons-logging-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-commons-logging@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-trax-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-trax-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-trax-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-trax@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-jdepend-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-jdepend-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-jdepend-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-jdepend@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-junit-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-junit-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-junit-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-junit@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-oro-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-apache-oro-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-apache-oro-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-oro@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-jmf-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-jmf-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-jmf-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-jmf@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-antlr-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-antlr-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-antlr-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-antlr@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-scripts-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-scripts-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-scripts-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-scripts@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-regexp@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-bsf@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-nodeps-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-nodeps-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-nodeps-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-nodeps@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-swing-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-swing-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-swing-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-swing@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-jsch-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-jsch-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-jsch-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-jsch@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-bcel@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch", "product": { "name": "ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch", "product_id": "ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ant-apache-log4j@1.7.1-14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch", "product": { "name": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch", "product_id": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.2.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "struts12-0:1.2.9-3.1.ep5.el6.noarch", "product": { "name": "struts12-0:1.2.9-3.1.ep5.el6.noarch", "product_id": "struts12-0:1.2.9-3.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/struts12@1.2.9-3.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch", "product": { "name": "jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch", "product_id": "jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-core@2.2.17-1.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch", "product": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch", "product_id": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-spi@2.1.2-1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch", "product": { "name": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch", "product_id": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common-logging-jdk@2.1.2-1.2.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch", "product": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch", "product_id": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jms-1.1-api@5.0.1-2.9.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch", "product": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch", "product_id": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee-poms@5.0.1-2.9.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch", "product": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch", "product_id": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-transaction-1.0.1-api@5.0.1-2.9.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch", "product": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch", "product_id": "jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.9.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.3-apis@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.2-apis@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-resolver10@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-which11@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-jaxp-1.1-apis@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-which10@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch", "product": { "name": "xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch", "product_id": "xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-commons-resolver11@1.3.04-7.14.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-oro-0:2.0.8-7.ep5.el6.noarch", "product": { "name": "jakarta-oro-0:2.0.8-7.ep5.el6.noarch", "product_id": "jakarta-oro-0:2.0.8-7.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-7.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch", "product": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch", "product_id": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xalan-j2@2.7.1-5.3_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch", "product": { "name": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch", "product_id": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-taglibs-standard@1.1.1-12.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch", "product": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch", "product_id": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api-javadoc@1.0.2-3.3.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch", "product": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch", "product_id": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-ejb-persistence-3.0-api@1.0.2-3.3.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch", "product": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch", "product_id": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@3.1.0-1.8.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch", "product": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch", "product_id": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations-javadoc@3.1.0-1.8.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.12.0-3.ep5.el6.noarch", "product": { "name": "javassist-0:3.12.0-3.ep5.el6.noarch", "product_id": "javassist-0:3.12.0-3.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.12.0-3.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch", "product_id": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.2.2.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.4.0-3.5.GA_CP04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "product": { "name": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "product_id": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.4.0-3.5.GA_CP04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.4.0-4.4.GA_CP04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "product": { "name": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "product_id": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.4.0-4.4.GA_CP04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-11.1.ep5.el6.noarch", "product": { "name": "dom4j-0:1.6.1-11.1.ep5.el6.noarch", "product_id": "dom4j-0:1.6.1-11.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-11.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch", "product": { "name": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch", "product_id": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-codec@1.3-12.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "antlr-0:2.7.7-7.ep5.el6.noarch", "product": { "name": "antlr-0:2.7.7-7.ep5.el6.noarch", "product_id": "antlr-0:2.7.7-7.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/antlr@2.7.7-7.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-io-0:1.4-4.ep5.el6.noarch", "product": { "name": "jakarta-commons-io-0:1.4-4.ep5.el6.noarch", "product_id": "jakarta-commons-io-0:1.4-4.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-4.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch", "product": { "name": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch", "product_id": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.5.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch", "product": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch", "product_id": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jkstatus-ant@1.2.31-2.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "product": { "name": "hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "product_id": "hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.3.2-1.8.GA_CP04.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "product": { "name": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "product_id": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.3.2-1.8.GA_CP04.ep5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "cglib-0:2.2-5.4.ep5.el6.noarch", "product": { "name": "cglib-0:2.2-5.4.ep5.el6.noarch", "product_id": "cglib-0:2.2-5.4.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cglib@2.2-5.4.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "product": { "name": "tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_id": "tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.33-15_patch_04.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "objectweb-asm31-0:3.1-12.1.ep5.el6.noarch", "product": { "name": "objectweb-asm31-0:3.1-12.1.ep5.el6.noarch", "product_id": "objectweb-asm31-0:3.1-12.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/objectweb-asm31@3.1-12.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product": { "name": "mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_id": "mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-demo@1.0.10-2.2.GA_CP01.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_id": "mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-jbossweb2@1.0.10-2.2.GA_CP01.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product": { "name": "mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_id": "mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-jbossas@1.0.10-2.2.GA_CP01.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product": { "name": "mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_id": "mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.0.10-2.2.GA_CP01.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch", "product": { "name": "tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_id": "tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.32-14_patch_03.ep5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.noarch" }, "product_reference": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-13.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.src" }, "product_reference": "ant-0:1.7.1-13.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.noarch" }, "product_reference": "antlr-0:2.7.7-7.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.src" }, "product_reference": "antlr-0:2.7.7-7.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-0:5.2-8.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.noarch" }, "product_reference": "bcel-0:5.2-8.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-0:5.2-8.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.src" }, "product_reference": "bcel-0:5.2-8.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.src" }, "product_reference": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.noarch" }, "product_reference": "dom4j-0:1.6.1-11.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.src" }, "product_reference": "dom4j-0:1.6.1-11.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch" }, "product_reference": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src" }, "product_reference": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src" }, "product_reference": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src" }, "product_reference": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-0:2.2.17-14.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.src" }, "product_reference": "httpd22-0:2.2.17-14.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-devel-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-devel-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-manual-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-manual-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.src" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386" }, "product_reference": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64" }, "product_reference": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch" }, "product_reference": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src" }, "product_reference": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.src" }, "product_reference": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.noarch" }, "product_reference": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.src" }, "product_reference": "javassist-0:3.12.0-1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.noarch" }, "product_reference": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.src" }, "product_reference": "jboss-common-core-0:2.2.17-1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el4.src" }, "product_reference": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch" }, "product_reference": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch" }, "product_reference": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch" }, "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src" }, "product_reference": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch" }, "product_reference": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.src" }, "product_reference": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src" }, "product_reference": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386" }, "product_reference": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src" }, "product_reference": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64" }, "product_reference": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386" }, "product_reference": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64" }, "product_reference": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-0:1.2.31-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-0:1.2.31-1.ep5.el4.src" }, "product_reference": "mod_jk-0:1.2.31-1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.i386" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386" }, "product_reference": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64" }, "product_reference": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.i386" }, "product_reference": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64" }, "product_reference": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl22-1:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.i386" }, "product_reference": "mod_ssl22-1:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.noarch" }, "product_reference": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.src" }, "product_reference": "mx4j-1:3.0.1-9.3.4.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch" }, "product_reference": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src" }, "product_reference": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.src" }, "product_reference": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.noarch" }, "product_reference": "struts12-0:1.2.9-3.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.src" }, "product_reference": "struts12-0:1.2.9-3.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.i386" }, "product_reference": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.src" }, "product_reference": "tomcat-native-0:1.1.20-2.0.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64" }, "product_reference": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386" }, "product_reference": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.src" }, "product_reference": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.src" }, "product_reference": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch" }, "product_reference": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src" }, "product_reference": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-1:1.3.04-7.12.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.src" }, "product_reference": "xml-commons-1:1.3.04-7.12.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.noarch" }, "product_reference": "ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-13.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.src" }, "product_reference": "ant-0:1.7.1-13.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.noarch" }, "product_reference": "antlr-0:2.7.7-7.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.src" }, "product_reference": "antlr-0:2.7.7-7.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-0:5.2-8.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.noarch" }, "product_reference": "bcel-0:5.2-8.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-0:5.2-8.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.src" }, "product_reference": "bcel-0:5.2-8.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.src" }, "product_reference": "cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.noarch" }, "product_reference": "dom4j-0:1.6.1-11.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.src" }, "product_reference": "dom4j-0:1.6.1-11.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch" }, "product_reference": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src" }, "product_reference": "ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src" }, "product_reference": "glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src" }, "product_reference": "hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-0:2.2.17-14.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.src" }, "product_reference": "httpd22-0:2.2.17-14.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-devel-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-devel-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-manual-0:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.i386" }, "product_reference": "httpd22-manual-0:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.src" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386" }, "product_reference": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64" }, "product_reference": "jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch" }, "product_reference": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src" }, "product_reference": "jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch" }, "product_reference": "jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.src" }, "product_reference": "jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src" }, "product_reference": "jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.noarch" }, "product_reference": "javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.src" }, "product_reference": "javassist-0:3.12.0-1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.noarch" }, "product_reference": "jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.src" }, "product_reference": "jboss-common-core-0:2.2.17-1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el4.src" }, "product_reference": "jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch" }, "product_reference": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch" }, "product_reference": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch" }, "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src" }, "product_reference": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch" }, "product_reference": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.src" }, "product_reference": "log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src" }, "product_reference": "mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386" }, "product_reference": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src" }, "product_reference": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64" }, "product_reference": "mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386" }, "product_reference": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64" }, "product_reference": "mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch" }, "product_reference": "mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-0:1.2.31-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-0:1.2.31-1.ep5.el4.src" }, "product_reference": "mod_jk-0:1.2.31-1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.i386" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386" }, "product_reference": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64" }, "product_reference": "mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.i386" }, "product_reference": "mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64" }, "product_reference": "mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl22-1:2.2.17-14.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.i386" }, "product_reference": "mod_ssl22-1:2.2.17-14.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.x86_64" }, "product_reference": "mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.noarch" }, "product_reference": "mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mx4j-1:3.0.1-9.3.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.src" }, "product_reference": "mx4j-1:3.0.1-9.3.4.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch" }, "product_reference": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src" }, "product_reference": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch" }, "product_reference": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.src" }, "product_reference": "regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.noarch" }, "product_reference": "struts12-0:1.2.9-3.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.src" }, "product_reference": "struts12-0:1.2.9-3.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.i386" }, "product_reference": "tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.src" }, "product_reference": "tomcat-native-0:1.1.20-2.0.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64" }, "product_reference": "tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386" }, "product_reference": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.src" }, "product_reference": "tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.src" }, "product_reference": "tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch" }, "product_reference": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src" }, "product_reference": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-1:1.3.04-7.12.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.src" }, "product_reference": "xml-commons-1:1.3.04-7.12.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch" }, "product_reference": "xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-13.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el5.src" }, "product_reference": "ant-0:1.7.1-13.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch" }, "product_reference": "ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el5.noarch" }, "product_reference": "antlr-0:2.7.7-7.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el5.src" }, "product_reference": "antlr-0:2.7.7-7.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch" }, "product_reference": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src" }, "product_reference": "cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el5.noarch" }, "product_reference": "dom4j-0:1.6.1-11.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el5.src" }, "product_reference": "dom4j-0:1.6.1-11.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch" }, "product_reference": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src" }, "product_reference": "ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src" }, "product_reference": "glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch" }, "product_reference": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src" }, "product_reference": "hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch" }, "product_reference": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch" }, "product_reference": "hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-11.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-11.1.ep5.el5.i386" }, "product_reference": "httpd-0:2.2.17-11.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-11.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-11.1.ep5.el5.src" }, "product_reference": "httpd-0:2.2.17-11.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-11.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-11.1.ep5.el5.x86_64" }, "product_reference": "httpd-0:2.2.17-11.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-11.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-11.1.ep5.el5.i386" }, "product_reference": "httpd-devel-0:2.2.17-11.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-11.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-11.1.ep5.el5.i386" }, "product_reference": "httpd-manual-0:2.2.17-11.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch" }, "product_reference": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch" }, "product_reference": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src" }, "product_reference": "jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el5.noarch" }, "product_reference": "javassist-0:3.12.0-1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el5.src" }, "product_reference": "javassist-0:3.12.0-1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el5.noarch" }, "product_reference": "jboss-common-core-0:2.2.17-1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el5.src" }, "product_reference": "jboss-common-core-0:2.2.17-1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch" }, "product_reference": "jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el5.src" }, "product_reference": "jboss-javaee-0:5.0.1-2.9.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch" }, "product_reference": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch" }, "product_reference": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch" }, "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src" }, "product_reference": "jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src" }, "product_reference": "mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch" }, "product_reference": "mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch" }, "product_reference": "mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch" }, "product_reference": "mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386" }, "product_reference": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src" }, "product_reference": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64" }, "product_reference": "mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch" }, "product_reference": "mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-0:1.2.31-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_jk-0:1.2.31-1.1.ep5.el5.src" }, "product_reference": "mod_jk-0:1.2.31-1.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386" }, "product_reference": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64" }, "product_reference": "mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-11.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-11.1.ep5.el5.i386" }, "product_reference": "mod_ssl-1:2.2.17-11.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch" }, "product_reference": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src" }, "product_reference": "objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-3.1.ep5.el5.noarch" }, "product_reference": "struts12-0:1.2.9-3.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-3.1.ep5.el5.src" }, "product_reference": "struts12-0:1.2.9-3.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.1.ep5.el5.i386" }, "product_reference": "tomcat-native-0:1.1.20-2.1.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.1.ep5.el5.src" }, "product_reference": "tomcat-native-0:1.1.20-2.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64" }, "product_reference": "tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.33-16_patch_04.ep5.el5.src" }, "product_reference": "tomcat5-0:5.5.33-16_patch_04.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src" }, "product_reference": "tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch" }, "product_reference": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src" }, "product_reference": "xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch" }, "product_reference": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src" }, "product_reference": "xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch" }, "product_reference": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch" }, "product_reference": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch" }, "product_reference": "xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-0:1.7.1-14.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-0:1.7.1-14.ep5.el6.src" }, "product_reference": "ant-0:1.7.1-14.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-antlr-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-antlr-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-antlr-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-oro-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-apache-oro-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-apache-oro-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-commons-logging-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-commons-logging-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-commons-logging-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-commons-net-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-commons-net-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-commons-net-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-javamail-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-javamail-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-javamail-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-jdepend-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-jdepend-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-jdepend-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-jmf-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-jmf-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-jmf-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-jsch-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-jsch-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-jsch-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-junit-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-junit-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-junit-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-nodeps-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-nodeps-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-nodeps-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-scripts-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-scripts-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-scripts-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-swing-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-swing-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-swing-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ant-trax-0:1.7.1-14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ant-trax-0:1.7.1-14.ep5.el6.noarch" }, "product_reference": "ant-trax-0:1.7.1-14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:antlr-0:2.7.7-7.ep5.el6.noarch" }, "product_reference": "antlr-0:2.7.7-7.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "antlr-0:2.7.7-7.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:antlr-0:2.7.7-7.ep5.el6.src" }, "product_reference": "antlr-0:2.7.7-7.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:cglib-0:2.2-5.4.ep5.el6.noarch" }, "product_reference": "cglib-0:2.2-5.4.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "cglib-0:2.2-5.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:cglib-0:2.2-5.4.ep5.el6.src" }, "product_reference": "cglib-0:2.2-5.4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:dom4j-0:1.6.1-11.1.ep5.el6.noarch" }, "product_reference": "dom4j-0:1.6.1-11.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-11.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:dom4j-0:1.6.1-11.1.ep5.el6.src" }, "product_reference": "dom4j-0:1.6.1-11.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.3.1.1-4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ecj3-1:3.3.1.1-4.ep5.el6.noarch" }, "product_reference": "ecj3-1:3.3.1.1-4.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.3.1.1-4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:ecj3-1:3.3.1.1-4.ep5.el6.src" }, "product_reference": "ecj3-1:3.3.1.1-4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src" }, "product_reference": "glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch" }, "product_reference": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src" }, "product_reference": "hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src" }, "product_reference": "hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src" }, "product_reference": "hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch" }, "product_reference": "hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch" }, "product_reference": "hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src" }, "product_reference": "hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch" }, "product_reference": "hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-11.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-0:2.2.17-11.2.ep5.el6.i386" }, "product_reference": "httpd-0:2.2.17-11.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-11.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-0:2.2.17-11.2.ep5.el6.src" }, "product_reference": "httpd-0:2.2.17-11.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-11.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-0:2.2.17-11.2.ep5.el6.x86_64" }, "product_reference": "httpd-0:2.2.17-11.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-11.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-11.2.ep5.el6.i386" }, "product_reference": "httpd-devel-0:2.2.17-11.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-11.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-11.2.ep5.el6.i386" }, "product_reference": "httpd-manual-0:2.2.17-11.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64" }, "product_reference": "httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.17-11.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-11.2.ep5.el6.i386" }, "product_reference": "httpd-tools-0:2.2.17-11.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src" }, "product_reference": "jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src" }, "product_reference": "jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch" }, "product_reference": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-codec-0:1.3-12.1.ep5.el6.src" }, "product_reference": "jakarta-commons-codec-0:1.3-12.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-collections-0:3.2.1-4.ep5.el6.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src" }, "product_reference": "jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64" }, "product_reference": "jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src" }, "product_reference": "jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch" }, "product_reference": "jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src" }, "product_reference": "jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src" }, "product_reference": "jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src" }, "product_reference": "jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-io-0:1.4-4.ep5.el6.noarch" }, "product_reference": "jakarta-commons-io-0:1.4-4.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-io-0:1.4-4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-io-0:1.4-4.ep5.el6.src" }, "product_reference": "jakarta-commons-io-0:1.4-4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch" }, "product_reference": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-logging-0:1.1.1-1.ep5.el6.src" }, "product_reference": "jakarta-commons-logging-0:1.1.1-1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch" }, "product_reference": "jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-15.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-pool-0:1.3-15.ep5.el6.noarch" }, "product_reference": "jakarta-commons-pool-0:1.3-15.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-0:1.3-15.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-pool-0:1.3-15.ep5.el6.src" }, "product_reference": "jakarta-commons-pool-0:1.3-15.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch" }, "product_reference": "jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src" }, "product_reference": "jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-oro-0:2.0.8-7.ep5.el6.noarch" }, "product_reference": "jakarta-oro-0:2.0.8-7.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-oro-0:2.0.8-7.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-oro-0:2.0.8-7.ep5.el6.src" }, "product_reference": "jakarta-oro-0:2.0.8-7.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src" }, "product_reference": "jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-3.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:javassist-0:3.12.0-3.ep5.el6.noarch" }, "product_reference": "javassist-0:3.12.0-3.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.12.0-3.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:javassist-0:3.12.0-3.ep5.el6.src" }, "product_reference": "javassist-0:3.12.0-3.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch" }, "product_reference": "jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-core-0:2.2.17-1.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-common-core-0:2.2.17-1.2.ep5.el6.src" }, "product_reference": "jboss-common-core-0:2.2.17-1.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src" }, "product_reference": "jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src" }, "product_reference": "jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch" }, "product_reference": "jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-0:5.0.1-2.9.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-javaee-0:5.0.1-2.9.ep5.el6.src" }, "product_reference": "jboss-javaee-0:5.0.1-2.9.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch" }, "product_reference": "jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch" }, "product_reference": "jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch" }, "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jcommon-0:1.0.16-1.2.2.ep5.el6.noarch" }, "product_reference": "jcommon-0:1.0.16-1.2.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.2.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jcommon-0:1.0.16-1.2.2.ep5.el6.src" }, "product_reference": "jcommon-0:1.0.16-1.2.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src" }, "product_reference": "mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch" }, "product_reference": "mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch" }, "product_reference": "mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch" }, "product_reference": "mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386" }, "product_reference": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src" }, "product_reference": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64" }, "product_reference": "mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch" }, "product_reference": "mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-0:1.2.31-1.1.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_jk-0:1.2.31-1.1.2.ep5.el6.src" }, "product_reference": "mod_jk-0:1.2.31-1.1.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64" }, "product_reference": "mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386" }, "product_reference": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64" }, "product_reference": "mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-11.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-11.2.ep5.el6.i386" }, "product_reference": "mod_ssl-1:2.2.17-11.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm31-0:3.1-12.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:objectweb-asm31-0:3.1-12.1.ep5.el6.noarch" }, "product_reference": "objectweb-asm31-0:3.1-12.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "objectweb-asm31-0:3.1-12.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:objectweb-asm31-0:3.1-12.1.ep5.el6.src" }, "product_reference": "objectweb-asm31-0:3.1-12.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:struts12-0:1.2.9-3.1.ep5.el6.noarch" }, "product_reference": "struts12-0:1.2.9-3.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "struts12-0:1.2.9-3.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:struts12-0:1.2.9-3.1.ep5.el6.src" }, "product_reference": "struts12-0:1.2.9-3.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src" }, "product_reference": "tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386" }, "product_reference": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat-native-0:1.1.20-2.1.2.ep5.el6.src" }, "product_reference": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64" }, "product_reference": "tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-0:5.5.33-15_patch_04.ep5.el6.src" }, "product_reference": "tomcat5-0:5.5.33-15_patch_04.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-0:6.0.32-14_patch_03.ep5.el6.src" }, "product_reference": "tomcat6-0:6.0.32-14_patch_03.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src" }, "product_reference": "xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch" }, "product_reference": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src" }, "product_reference": "xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-0:1.3.04-7.14.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-0:1.3.04-7.14.ep5.el6.src" }, "product_reference": "xml-commons-0:1.3.04-7.14.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch" }, "product_reference": "xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1157", "discovery_date": "2010-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "585331" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server\u0027s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure in authentication headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.noarch", "4AS-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.src", "4AS-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.src", "4AS-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.noarch", "4AS-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.src", "4AS-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.src", "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "4AS-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_jk-0:1.2.31-1.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.src", "4AS-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.noarch", "4AS-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "4AS-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "4AS-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.src", "4AS-JBEWS-5.0.0:xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "4AS-JBEWS-5.0.0:xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "4ES-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.noarch", "4ES-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.src", "4ES-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.src", "4ES-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.noarch", "4ES-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.src", "4ES-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "4ES-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "4ES-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "4ES-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "4ES-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.src", "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "4ES-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "4ES-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.src", "4ES-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "4ES-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "4ES-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4ES-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4ES-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4ES-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "4ES-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "4ES-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "4ES-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4ES-JBEWS-5.0.0:mod_jk-0:1.2.31-1.ep5.el4.src", "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.i386", "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "4ES-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.src", "4ES-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "4ES-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "4ES-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.noarch", "4ES-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.noarch", "4ES-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el4.src", "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.noarch", "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el4.src", "4ES-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.noarch", "4ES-JBEWS-5.0.0:xml-commons-1:1.3.04-7.12.ep5.el4.src", "4ES-JBEWS-5.0.0:xml-commons-jaxp-1.2-apis-1:1.3.04-7.12.ep5.el4.noarch", "4ES-JBEWS-5.0.0:xml-commons-jaxp-1.3-apis-1:1.3.04-7.12.ep5.el4.noarch", "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.3.04-7.12.ep5.el4.noarch", "5Server-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:ant-antlr-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-apache-bcel-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-apache-bsf-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-apache-log4j-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-apache-oro-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-apache-regexp-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-apache-resolver-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-commons-logging-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-javamail-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-jdepend-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-jmf-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-jsch-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-junit-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-nodeps-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-scripts-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-swing-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ant-trax-0:1.7.1-13.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el5.noarch", "5Server-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el5.src", "5Server-JBEWS-5.0.0:cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:cglib-0:2.2-5.1.1.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el5.noarch", "5Server-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el5.src", "5Server-JBEWS-5.0.0:ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:ecj3-1:3.3.1.1-3.1.1.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.1.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-1:3.3.2-1.4.GA_CP04.ep5.el5.src", "5Server-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.2.GA_CP04.ep5.el5.src", "5Server-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.2.GA_CP04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el5.src", "5Server-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el5.src", "5Server-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.4.GA_CP04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-11.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-11.1.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-11.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-11.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-11.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-11.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-11.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.2.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.1.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.2.1.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.1.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.2.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.1.ep5.el5.src", "5Server-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el5.src", "5Server-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el5.src", "5Server-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el5.src", "5Server-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el5.src", "5Server-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "5Server-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "5Server-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "5Server-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "5Server-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.src", "5Server-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.1.GA_CP01.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.1.GA_CP01.ep5.el5.noarch", "5Server-JBEWS-5.0.0:mod_jk-0:1.2.31-1.1.ep5.el5.src", "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-11.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-11.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:struts12-0:1.2.9-3.1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:struts12-0:1.2.9-3.1.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.1.ep5.el5.i386", "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.1.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.1.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.33-16_patch_04.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-16_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.32-15.1_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.32-15.1_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.noarch", "5Server-JBEWS-5.0.0:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el5.src", "5Server-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.noarch", "5Server-JBEWS-5.0.0:xerces-j2-0:2.9.1-3.patch01.1.ep5.el5.src", "5Server-JBEWS-5.0.0:xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:xml-commons-0:1.3.04-7.10.jdk6.ep5.el5.src", "5Server-JBEWS-5.0.0:xml-commons-jaxp-1.2-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:xml-commons-jaxp-1.3-apis-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "5Server-JBEWS-5.0.0:xml-commons-resolver12-0:1.3.04-7.10.jdk6.ep5.el5.noarch", "6Server-JBEWS-1:ant-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-0:1.7.1-14.ep5.el6.src", "6Server-JBEWS-1:ant-antlr-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-apache-bcel-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-apache-bsf-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-apache-log4j-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-apache-oro-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-apache-regexp-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-apache-resolver-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-commons-logging-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-commons-net-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-javamail-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-jdepend-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-jmf-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-jsch-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-junit-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-nodeps-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-scripts-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-swing-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:ant-trax-0:1.7.1-14.ep5.el6.noarch", "6Server-JBEWS-1:antlr-0:2.7.7-7.ep5.el6.noarch", "6Server-JBEWS-1:antlr-0:2.7.7-7.ep5.el6.src", "6Server-JBEWS-1:cglib-0:2.2-5.4.ep5.el6.noarch", "6Server-JBEWS-1:cglib-0:2.2-5.4.ep5.el6.src", "6Server-JBEWS-1:dom4j-0:1.6.1-11.1.ep5.el6.noarch", "6Server-JBEWS-1:dom4j-0:1.6.1-11.1.ep5.el6.src", "6Server-JBEWS-1:ecj3-1:3.3.1.1-4.ep5.el6.noarch", "6Server-JBEWS-1:ecj3-1:3.3.1.1-4.ep5.el6.src", "6Server-JBEWS-1:glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.noarch", "6Server-JBEWS-1:glassfish-jsf-0:1.2_13-3.1.4.ep5.el6.src", "6Server-JBEWS-1:hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-1:3.3.2-1.8.GA_CP04.ep5.el6.src", "6Server-JBEWS-1:hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-annotations-0:3.4.0-3.5.GA_CP04.ep5.el6.src", "6Server-JBEWS-1:hibernate3-annotations-javadoc-0:3.4.0-3.5.GA_CP04.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el6.src", "6Server-JBEWS-1:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.3.ep5.el6.src", "6Server-JBEWS-1:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.3.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-entitymanager-0:3.4.0-4.4.GA_CP04.ep5.el6.src", "6Server-JBEWS-1:hibernate3-entitymanager-javadoc-0:3.4.0-4.4.GA_CP04.ep5.el6.noarch", "6Server-JBEWS-1:hibernate3-javadoc-1:3.3.2-1.8.GA_CP04.ep5.el6.noarch", "6Server-JBEWS-1:httpd-0:2.2.17-11.2.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-11.2.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-11.2.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-11.2.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-11.2.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-11.2.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-11.2.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-11.2.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-11.2.ep5.el6.x86_64", "6Server-JBEWS-1:jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-beanutils-0:1.8.0-9.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-chain-0:1.2-2.2.2.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-codec-0:1.3-12.1.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-codec-0:1.3-12.1.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-collections-0:3.2.1-4.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-collections-0:3.2.1-4.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-daemon-1:1.0.5-1.1.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.i386", "6Server-JBEWS-1:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el6.x86_64", "6Server-JBEWS-1:jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-dbcp-0:1.2.1-16.2.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.2.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.5.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-httpclient-1:3.1-1.2.2.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-io-0:1.4-4.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-io-0:1.4-4.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-logging-0:1.1.1-1.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-logging-0:1.1.1-1.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-logging-jboss-0:1.1-10.2.2.1.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-logging-tomcat6-0:1.1.1-1.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-pool-0:1.3-15.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-pool-0:1.3-15.ep5.el6.src", "6Server-JBEWS-1:jakarta-commons-pool-tomcat5-0:1.3-15.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6.src", "6Server-JBEWS-1:jakarta-oro-0:2.0.8-7.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-oro-0:2.0.8-7.ep5.el6.src", "6Server-JBEWS-1:jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.noarch", "6Server-JBEWS-1:jakarta-taglibs-standard-0:1.1.1-12.ep5.el6.src", "6Server-JBEWS-1:javassist-0:3.12.0-3.ep5.el6.noarch", "6Server-JBEWS-1:javassist-0:3.12.0-3.ep5.el6.src", "6Server-JBEWS-1:jboss-common-core-0:2.2.17-1.2.ep5.el6.noarch", "6Server-JBEWS-1:jboss-common-core-0:2.2.17-1.2.ep5.el6.src", "6Server-JBEWS-1:jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.noarch", "6Server-JBEWS-1:jboss-common-logging-jdk-0:2.1.2-1.2.ep5.el6.src", "6Server-JBEWS-1:jboss-common-logging-spi-0:2.1.2-1.ep5.el6.noarch", "6Server-JBEWS-1:jboss-common-logging-spi-0:2.1.2-1.ep5.el6.src", "6Server-JBEWS-1:jboss-javaee-0:5.0.1-2.9.ep5.el6.noarch", "6Server-JBEWS-1:jboss-javaee-0:5.0.1-2.9.ep5.el6.src", "6Server-JBEWS-1:jboss-javaee-poms-0:5.0.1-2.9.ep5.el6.noarch", "6Server-JBEWS-1:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el6.noarch", "6Server-JBEWS-1:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el6.noarch", "6Server-JBEWS-1:jcommon-0:1.0.16-1.2.2.ep5.el6.noarch", "6Server-JBEWS-1:jcommon-0:1.0.16-1.2.2.ep5.el6.src", "6Server-JBEWS-1:jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.noarch", "6Server-JBEWS-1:jfreechart-0:1.0.13-2.3.2.1.2.ep5.el6.src", "6Server-JBEWS-1:mod_cluster-0:1.0.10-2.2.GA_CP01.ep5.el6.src", "6Server-JBEWS-1:mod_cluster-demo-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "6Server-JBEWS-1:mod_cluster-jbossas-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "6Server-JBEWS-1:mod_cluster-jbossweb2-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "6Server-JBEWS-1:mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.i386", "6Server-JBEWS-1:mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.src", "6Server-JBEWS-1:mod_cluster-native-0:1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64", "6Server-JBEWS-1:mod_cluster-tomcat6-0:1.0.10-2.2.GA_CP01.ep5.el6.noarch", "6Server-JBEWS-1:mod_jk-0:1.2.31-1.1.2.ep5.el6.src", "6Server-JBEWS-1:mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.i386", "6Server-JBEWS-1:mod_jk-ap20-0:1.2.31-1.1.2.ep5.el6.x86_64", "6Server-JBEWS-1:mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.i386", "6Server-JBEWS-1:mod_jk-manual-0:1.2.31-1.1.2.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-11.2.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-11.2.ep5.el6.x86_64", "6Server-JBEWS-1:objectweb-asm31-0:3.1-12.1.ep5.el6.noarch", "6Server-JBEWS-1:objectweb-asm31-0:3.1-12.1.ep5.el6.src", "6Server-JBEWS-1:struts12-0:1.2.9-3.1.ep5.el6.noarch", "6Server-JBEWS-1:struts12-0:1.2.9-3.1.ep5.el6.src", "6Server-JBEWS-1:tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.noarch", "6Server-JBEWS-1:tomcat-jkstatus-ant-0:1.2.31-2.1.ep5.el6.src", "6Server-JBEWS-1:tomcat-native-0:1.1.20-2.1.2.ep5.el6.i386", "6Server-JBEWS-1:tomcat-native-0:1.1.20-2.1.2.ep5.el6.src", "6Server-JBEWS-1:tomcat-native-0:1.1.20-2.1.2.ep5.el6.x86_64", "6Server-JBEWS-1:tomcat5-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-0:5.5.33-15_patch_04.ep5.el6.src", "6Server-JBEWS-1:tomcat5-admin-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-common-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-jasper-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-jasper-eclipse-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-jasper-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-jsp-2.0-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-parent-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-server-lib-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-servlet-2.4-api-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat5-webapps-0:5.5.33-15_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-0:6.0.32-14_patch_03.ep5.el6.src", "6Server-JBEWS-1:tomcat6-admin-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-docs-webapp-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-el-1.0-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-javadoc-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-jsp-2.1-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-lib-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-log4j-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-servlet-2.5-api-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:tomcat6-webapps-0:6.0.32-14_patch_03.ep5.el6.noarch", "6Server-JBEWS-1:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.noarch", "6Server-JBEWS-1:xalan-j2-0:2.7.1-5.3_patch_04.ep5.el6.src", "6Server-JBEWS-1:xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.noarch", "6Server-JBEWS-1:xerces-j2-0:2.9.1-8.patch01.1.ep5.el6.src", "6Server-JBEWS-1:xml-commons-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-0:1.3.04-7.14.ep5.el6.src", "6Server-JBEWS-1:xml-commons-jaxp-1.1-apis-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-jaxp-1.2-apis-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-jaxp-1.3-apis-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-resolver10-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-resolver11-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-resolver12-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-which10-0:1.3.04-7.14.ep5.el6.noarch", "6Server-JBEWS-1:xml-commons-which11-0:1.3.04-7.14.ep5.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1157" }, { "category": "external", "summary": "RHBZ#585331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1157", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157" } ], "release_date": "2010-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-22T23:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:ant-0:1.7.1-13.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.noarch", "4AS-JBEWS-5.0.0:antlr-0:2.7.7-7.ep5.el4.src", "4AS-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:bcel-0:5.2-8.1.ep5.el4.src", "4AS-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:cglib-0:2.2-5.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.noarch", "4AS-JBEWS-5.0.0:dom4j-0:1.6.1-11.ep5.el4.src", "4AS-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:ecj-1:3.3.1.1-3.2.2.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:glassfish-jaf-0:1.1.0-6.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:glassfish-javamail-0:1.4.2-0.4.ep5.el4.src", "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-1:3.3.2-1.5.GA_CP04.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-annotations-0:3.4.0-3.3.GA_CP04.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-annotations-javadoc-0:3.4.0-3.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-0:3.1.0-1.8.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-commons-annotations-javadoc-0:3.1.0-1.8.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-1:1.0.2-3.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-ejb-persistence-3.0-api-javadoc-1:1.0.2-3.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-entitymanager-0:3.4.0-4.3.GA_CP04.ep5.el4.src", "4AS-JBEWS-5.0.0:hibernate3-entitymanager-javadoc-0:3.4.0-4.3.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:hibernate3-javadoc-1:3.3.2-1.5.GA_CP04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.src", "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-beanutils-0:1.8.0-4.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.2.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-codec-0:1.3-9.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-collections-0:3.2.1-4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-collections-tomcat5-0:3.2.1-4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-1:1.0.5-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.i386", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-1:1.0.5-1.4.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.i386", "4AS-JBEWS-5.0.0:jakarta-commons-daemon-jsvc-debuginfo-1:1.0.5-1.4.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-0:1.2.1-16.4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-dbcp-tomcat5-0:1.2.1-16.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-8.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-el-0:1.0-19.2.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-httpclient-1:3.1-1.1.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.3.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-launcher-0:1.1-4.6.1.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-logging-0:1.1.1-0.4.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-logging-jboss-0:1.1-10.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-logging-tomcat6-0:1.1.1-0.4.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-4.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-pool-0:1.3-11.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-commons-pool-tomcat5-0:1.3-11.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.5.1.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.3.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jakarta-taglibs-standard-0:1.1.1-9.ep5.el4.src", "4AS-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:javassist-0:3.12.0-1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-common-core-0:2.2.17-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-common-logging-jdk-0:2.1.2-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-common-logging-spi-0:2.1.2-1.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.9.ep5.el4.src", "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-jms-1.1-api-0:5.0.1-2.9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.9.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jcommon-0:1.0.16-1.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:jfreechart-0:1.0.13-2.3.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:log4j-0:1.2.14-18.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_cluster-0:1.0.10-2.GA_CP01.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_cluster-demo-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_cluster-jbossas-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_cluster-jbossweb2-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_cluster-native-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_cluster-native-debuginfo-0:1.0.10-2.GA_CP01.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_cluster-tomcat6-0:1.0.10-2.GA_CP01.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mod_jk-0:1.2.31-1.ep5.el4.src", "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.31-1.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.31-1.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.31-1.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.i386", "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-14.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.noarch", "4AS-JBEWS-5.0.0:mx4j-1:3.0.1-9.3.4.ep5.el4.src", "4AS-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:objectweb-asm-0:3.1-5.3.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.noarch", "4AS-JBEWS-5.0.0:regexp-0:1.5-1.2.1.jdk6.ep5.el4.src", "4AS-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.noarch", "4AS-JBEWS-5.0.0:struts12-0:1.2.9-3.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat-jkstatus-ant-0:1.2.31-2.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.i386", "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.20-2.0.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.i386", "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.20-2.0.ep5.el4.x86_64", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.33-14_patch_04.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.33-14_patch_04.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.32-15_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.32-15_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.32-15_patch_03.ep5.el4.noarch", "