Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux eus 6.6 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2017-3139
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Server Aus 6.4
Redhat Enterprise Linux Server Eus 6.7
Redhat Enterprise Linux Server Tus 6.6
392
VMScore
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c...
Polkit Project Polkit 0.115
Debian Debian Linux 8.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
578
VMScore
CVE-2018-1000805
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
Paramiko Paramiko 2.3.2
Paramiko Paramiko 2.2.3
Paramiko Paramiko 2.1.5
Paramiko Paramiko 2.0.8
Paramiko Paramiko 1.18.5
Paramiko Paramiko 1.17.6
Paramiko Paramiko 2.4.1
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Aus 6.4
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Server Eus 6.7
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Tus 6.6
1 Github repository
641
VMScore
CVE-2018-10675
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel prior to 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
Linux Linux Kernel
Redhat Enterprise Linux Server Aus 7.2
Redhat Enterprise Linux Server Tus 7.2
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Aus 6.4
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Eus 7.3
Redhat Enterprise Linux Server Eus 7.4
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Server Tus 7.4
Redhat Enterprise Linux Server Eus 7.5
Redhat Enterprise Linux Server Eus 6.7
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Tus 6.6
534
VMScore
CVE-2017-3600
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and previous versions, 5.6.35 and previous versions and 5.7.17 and previous versions. Difficult to exploit vulnerability allows high privi...
Oracle Mysql
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Eus 7.4
Redhat Enterprise Linux Server Eus 7.5
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Debian Debian Linux 8.0
Mariadb Mariadb
800
VMScore
CVE-2016-5195
Race condition in mm/gup.c in the Linux kernel 2.x up to and including 4.x prior to 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka ...
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Tus 6.5
Redhat Enterprise Linux Eus 6.7
Redhat Enterprise Linux Long Life 5.6
Redhat Enterprise Linux Aus 6.4
Redhat Enterprise Linux 5
Redhat Enterprise Linux Long Life 5.9
Redhat Enterprise Linux Aus 6.2
Redhat Enterprise Linux Eus 7.1
Redhat Enterprise Linux Eus 6.6
Redhat Enterprise Linux Aus 6.5
Debian Debian Linux 8.0
Debian Debian Linux 7.0
5 EDB exploits
183 Github repositories
6 Articles
668
VMScore
CVE-2014-9657
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType prior to 2.5.4 does not establish a minimum record size, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
668
VMScore
CVE-2014-9658
The tt_face_load_kern function in sfnt/ttkern.c in FreeType prior to 2.5.4 enforces an incorrect minimum table length, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Oracle Solaris 10.0
Oracle Solaris 11.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
668
VMScore
CVE-2014-9660
The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType prior to 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote malicious users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF fon...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
668
VMScore
CVE-2014-9661
type42/t42parse.c in FreeType prior to 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote malicious users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Hpc Node 6
Freetype Freetype
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »