Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 8.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-33951
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information...
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux For Real Time 8.0
Redhat Enterprise Linux For Real Time For Nfv 8.0
Redhat Enterprise Linux 9.0
NA
CVE-2023-33952
A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local priv...
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux For Real Time 8.0
Redhat Enterprise Linux For Real Time For Nfv 8.0
Redhat Enterprise Linux 9.0
187
VMScore
CVE-2021-3930
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, result...
Qemu Qemu
Redhat Openstack 10
Redhat Enterprise Linux 8.0
Redhat Openstack 13
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Ibm Z Systems 8.0
Redhat Codeready Linux Builder For Ibm Z Systems 8.0
Redhat Codeready Linux Builder For Power Little Endian 8.0
Redhat Codeready Linux Builder 8.0
Redhat Enterprise Linux Advanced Virtualization Eus 8.4
Debian Debian Linux 9.0
Debian Debian Linux 10.0
320
VMScore
CVE-2002-1509
A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 8.0
641
VMScore
CVE-2002-1160
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses s...
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 8.0
409
VMScore
CVE-2003-0464
The RPC code in Linux kernel 2.4 sets the reuse flag when sockets are created, which could allow local users to bind to UDP ports that are used by privileged services such as nfsd.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
445
VMScore
CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows malicious users to cause a denial of service ("kernel oops").
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 7.3
890
VMScore
CVE-2003-0248
The mxcsr code in Linux kernel 2.4 allows malicious users to modify CPU state registers via a malformed address.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
445
VMScore
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
187
VMScore
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »