Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise mrg 2.0 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2012-3460
cumin: At installation postgresql database user created without password
Redhat Enterprise Mrg 2.0
409
VMScore
CVE-2011-2925
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Redhat Enterprise Mrg 2.0
187
VMScore
CVE-2014-8181
The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 7.0
1 Github repository
436
VMScore
CVE-2017-15128
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel prior to 4.13.12. A lack of size check could cause a denial of service (BUG).
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 7.0
446
VMScore
CVE-2020-1749
A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rath...
Linux Linux Kernel -
Redhat Enterprise Linux 7.0
Redhat Enterprise Mrg 2.0
695
VMScore
CVE-2011-2699
The IPv6 implementation in the Linux kernel prior to 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote malicious users to cause a denial of service (disrupted networking) by predicting these values and sending c...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
Redhat Enterprise Mrg 2.0
614
VMScore
CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Redhat Linux 7.2
Linux Linux Kernel -
Redhat Enterprise Mrg 2.0
614
VMScore
CVE-2019-14898
The fix for CVE-2019-11599, affecting the Linux kernel prior to 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or g...
Linux Linux Kernel 5.0.10
Redhat Enterprise Mrg 2.0
188
VMScore
CVE-2015-1350
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system...
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.0
393
VMScore
CVE-2020-12826
A signal access-control issue exists in the Linux kernel prior to 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to...
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Canonical Ubuntu Linux 20.04
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »