Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise mrg 2.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2012-3460
cumin: At installation postgresql database user created without password
Redhat Enterprise Mrg 2.0
4.6
CVSSv2
CVE-2011-2925
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Redhat Enterprise Mrg 2.0
2.1
CVSSv2
CVE-2014-8181
The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 7.0
1 Github repository
5
CVSSv2
CVE-2020-1749
A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rath...
Linux Linux Kernel -
Redhat Enterprise Linux 7.0
Redhat Enterprise Mrg 2.0
7.8
CVSSv2
CVE-2011-2699
The IPv6 implementation in the Linux kernel prior to 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote malicious users to cause a denial of service (disrupted networking) by predicting these values and sending c...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
Redhat Enterprise Mrg 2.0
4.9
CVSSv2
CVE-2017-15128
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel prior to 4.13.12. A lack of size check could cause a denial of service (BUG).
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 7.0
6.9
CVSSv2
CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Redhat Linux 7.2
Linux Linux Kernel -
Redhat Enterprise Mrg 2.0
6.9
CVSSv2
CVE-2019-14898
The fix for CVE-2019-11599, affecting the Linux kernel prior to 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or g...
Linux Linux Kernel 5.0.10
Redhat Enterprise Mrg 2.0
2.1
CVSSv2
CVE-2015-1350
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system...
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.0
4.4
CVSSv2
CVE-2020-12826
A signal access-control issue exists in the Linux kernel prior to 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to...
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Canonical Ubuntu Linux 20.04
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »