Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enterprise mrg vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel prior to 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GET...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
Redhat Enterprise Mrg 2.0
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
7.1
CVSSv2
CVE-2010-4526
Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 up to and including 2.6.33 allows remote malicious users to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, wh...
Linux Linux Kernel 2.6.11
Linux Linux Kernel
Redhat Enterprise Mrg 1.0
Vmware Esx 4.1
Vmware Esx 4.0
6.9
CVSSv2
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
Linux Linux Kernel
Opensuse Leap 15.1
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Mrg 2.0
Fedoraproject Fedora 31
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Steelstore Cloud Integrated Storage -
Netapp Active Iq Unified Manager -
6.9
CVSSv2
CVE-2019-14898
The fix for CVE-2019-11599, affecting the Linux kernel prior to 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or g...
Linux Linux Kernel 5.0.10
Redhat Enterprise Mrg 2.0
6.9
CVSSv2
CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Redhat Linux 7.2
Linux Linux Kernel -
Redhat Enterprise Mrg 2.0
6.9
CVSSv2
CVE-2009-3547
Multiple race conditions in fs/pipe.c in the Linux kernel prior to 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
Linux Linux Kernel 2.6.32
Linux Linux Kernel
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Opensuse Opensuse 11.2
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 10
Vmware Esx 4.0
Vmware Vma 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
5 EDB exploits
1 Github repository
6.8
CVSSv2
CVE-2012-4446
The default configuration for Apache Qpid 0.20 and previous versions, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote malicious users to bypass authentication and have other unspecified impact via an ...
Apache Qpid 0.7
Apache Qpid 0.6
Apache Qpid 0.5
Apache Qpid 0.16
Apache Qpid 0.15
Apache Qpid 0.14
Apache Qpid 0.13
Apache Qpid 0.19
Apache Qpid 0.17
Apache Qpid 0.12
Apache Qpid 0.10
Apache Qpid 0.8
Apache Qpid
Apache Qpid 0.18
Apache Qpid 0.11
Apache Qpid 0.9
6.8
CVSSv2
CVE-2012-2734
Multiple cross-site request forgery (CSRF) vulnerabilities in Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote malicious users to hijack the authentication of arbitrary users for requests that execute commands via unspec...
Trevor Mckay Cumin 0.1.5192-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.5137-1
Trevor Mckay Cumin 0.1.5054-1
Trevor Mckay Cumin 0.1.5137-3
Trevor Mckay Cumin 0.1.4410-2
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin 0.1.5033-1
Trevor Mckay Cumin 0.1.4369-1
Trevor Mckay Cumin 0.1.5037-1
Trevor Mckay Cumin 0.1.3160-1
Trevor Mckay Cumin 0.1.5137-4
Trevor Mckay Cumin 0.1.5092-1
Trevor Mckay Cumin 0.1.5137-5
Trevor Mckay Cumin 0.1.5068-1
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin
Trevor Mckay Cumin 0.1.5105-1
Trevor Mckay Cumin 0.1.5137-2
Redhat Enterprise Mrg 2.0
6.7
CVSSv2
CVE-2018-16884
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host ker...
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Mrg 2.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
6.4
CVSSv2
CVE-2012-3492
The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x prior to 7.6.10 and 7.8.x prior to 7.8.4 uses authentication directories even when they have weak permissions, which allows remote malicious users to impersonate users by renaming a user's authentic...
Condor Project Condor 7.6.1
Condor Project Condor 7.6.3
Condor Project Condor 7.6.9
Condor Project Condor 7.6.0
Condor Project Condor 7.6.5
Condor Project Condor 7.6.6
Condor Project Condor 7.8.3
Condor Project Condor 7.8.1
Condor Project Condor 7.6.4
Condor Project Condor 7.8.0
Condor Project Condor 7.6.7
Condor Project Condor 7.6.2
Condor Project Condor 7.6.8
Condor Project Condor 7.8.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »