Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux aus 6.2 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-3139
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Redhat Enterprise Linux Server Eus 6.7
Redhat Enterprise Linux Server Tus 6.6
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Aus 6.4
Redhat Enterprise Linux Server Aus 6.5
4.6
CVSSv2
CVE-2012-0031
scoreboard.c in the Apache HTTP Server 2.2.21 and previous versions might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading t...
Apache Http Server
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Opensuse Opensuse 11.4
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Server 10
Redhat Jboss Enterprise Web Server 1.0.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
1 EDB exploit
4.3
CVSSv2
CVE-2012-0867
PostgreSQL 8.4.x prior to 8.4.11, 9.0.x prior to 9.0.7, and 9.1.x prior to 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote malicious users to spoof connections when the host name is exactly 32 characters.
Opensuse Project Opensuse 12.2
Postgresql Postgresql 8.4
Postgresql Postgresql 8.4.10
Postgresql Postgresql 8.4.8
Postgresql Postgresql 8.4.9
Postgresql Postgresql 8.4.2
Postgresql Postgresql 8.4.1
Postgresql Postgresql 8.4.3
Postgresql Postgresql 8.4.4
Postgresql Postgresql 8.4.5
Postgresql Postgresql 8.4.6
Postgresql Postgresql 8.4.7
Postgresql Postgresql 9.0
Postgresql Postgresql 9.0.1
Postgresql Postgresql 9.0.2
Postgresql Postgresql 9.0.3
Postgresql Postgresql 9.0.5
Postgresql Postgresql 9.0.4
Postgresql Postgresql 9.0.6
Debian Debian Linux 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Desktop Workstation 5
4.3
CVSSv2
CVE-2012-0876
The XML parser (xmlparse.c) in expat prior to 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via an XML file with many identifiers wit...
Libexpat Project Libexpat
Python Python
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.3
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
4.3
CVSSv2
CVE-2012-0037
Redland Raptor (aka libraptor) prior to 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice prior to 3.4.6 and 3.5.x prior to 3.5.1, and other products, allows user-assisted remote malicious users to read arbitrary files via a crafted XML external entity (XXE) declaration ...
Librdf Raptor
Libreoffice Libreoffice 3.5.0
Libreoffice Libreoffice
Apache Openoffice 3.3.0
Apache Openoffice 3.4.0
Fedoraproject Fedora 17
Fedoraproject Fedora 16
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Storage 2.0
Redhat Storage For Public Cloud 2.0
Redhat Enterprise Linux Eus 6.2
Redhat Gluster Storage Server For On-premise 2.0
Debian Debian Linux 6.0
4.3
CVSSv2
CVE-2012-2038
Adobe Flash Player prior to 10.3.183.20 and 11.x prior to 11.3.300.257 on Windows and Mac OS X; prior to 10.3.183.20 and 11.x prior to 11.2.202.236 on Linux; prior to 11.1.111.10 on Android 2.x and 3.x; and prior to 11.1.115.9 on Android 4.x, and Adobe AIR prior to 3.3.0.3610, al...
Adobe Flash Player
Adobe Air
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Desktop 11
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.2
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
4.3
CVSSv2
CVE-2012-1798
The TIFFGetEXIFProperties function in coders/tiff.c in ImageMagick prior to 6.7.6-3 allows remote malicious users to cause a denial of service (out-of-bounds read and crash) via a crafted EXIF IFD in a TIFF image.
Imagemagick Imagemagick
Debian Debian Linux 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.2
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Eus 6.2
Redhat Enterprise Linux Workstation 6.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
4.3
CVSSv2
CVE-2012-0248
ImageMagick 6.7.5-7 and previous versions allows remote malicious users to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
Imagemagick Imagemagick
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Redhat Storage 2.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.2
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Eus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
4.3
CVSSv2
CVE-2012-0260
The JPEGWarningHandler function in coders/jpeg.c in ImageMagick prior to 6.7.6-3 allows remote malicious users to cause a denial of service (memory consumption) via a JPEG image with a crafted sequence of restart markers.
Imagemagick Imagemagick
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.10
Debian Debian Linux 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Aus 6.2
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.2
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Eus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
4.3
CVSSv2
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »