Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux 2.1 vulnerabilities and exploits
(subscribe to this query)
3.7
CVSSv3
CVE-2016-3452
Unspecified vulnerability in Oracle MySQL 5.5.48 and previous versions, 5.6.29 and previous versions, and 5.7.10 and previous versions and MariaDB prior to 5.5.49, 10.0.x prior to 10.0.25, and 10.1.x prior to 10.1.14 allows remote malicious users to affect confidentiality via vec...
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Oracle Mysql
Mariadb Mariadb
Ibm Powerkvm 3.1
Ibm Powerkvm 2.1
Oracle Linux 7
3.5
CVSSv3
CVE-2015-6815
The process_tx_desc function in hw/net/e1000.c in QEMU prior to 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows malicious users to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
Qemu Qemu
Fedoraproject Fedora 22
Fedoraproject Fedora 23
Fedoraproject Fedora 21
Novell Suse Linux Enterprise Server 11.0
Novell Suse Linux Enterprise Server 12.0
Novell Suse Linux Enterprise Debuginfo 11.0
Novell Suse Linux Enterprise Desktop 12.0
Novell Suse Linux Enterprise Desktop 11.0
Novell Suse Linux Enterprise Software Development Kit 11.0
Novell Suse Linux Enterprise Software Development Kit 12.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Openstack 5.0
Redhat Openstack 7.0
Redhat Enterprise Linux 5.0
Redhat Openstack 6.0
Xen Xen 4.4.3
Xen Xen 4.5.1
NA
CVE-2015-3900
RubyGems 2.0.x prior to 2.0.16, 2.2.x prior to 2.2.4, and 2.4.x prior to 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote malicious users to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hij...
Ruby-lang Ruby 2.0.0
Ruby-lang Ruby 2.2.0
Ruby-lang Ruby 2.1.4
Ruby-lang Ruby 2.1.3
Ruby-lang Ruby 2.1.1
Ruby-lang Ruby 1.9.2
Ruby-lang Ruby 1.9.1
Ruby-lang Ruby 1.9.3
Ruby-lang Ruby 1.9
Ruby-lang Ruby 2.1.2
Ruby-lang Ruby 2.1
Ruby-lang Ruby 2.1.5
Rubygems Rubygems 2.4.3
Rubygems Rubygems 2.2.1
Rubygems Rubygems 2.2.2
Rubygems Rubygems 2.0.13
Rubygems Rubygems 2.0.6
Rubygems Rubygems 2.0.15
Rubygems Rubygems 2.0.5
Rubygems Rubygems 2.0.4
Rubygems Rubygems 2.2.0
Rubygems Rubygems 2.4.5
1 Github repository
1 Article
NA
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and previous versions and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_...
Qemu Qemu
Redhat Openstack 4.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Openstack 5.0
Redhat Openstack 7.0
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Linux 5
Xen Xen 4.5.0
Redhat Openstack 6.0
1 EDB exploit
5 Github repositories
3 Articles
NA
CVE-2013-2174
Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 up to and including 7.30.0 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a &quo...
Haxx Curl 7.7
Haxx Curl 7.21.3
Haxx Curl 7.10
Haxx Curl 7.15.1
Haxx Curl 7.24.0
Haxx Curl 7.16.1
Haxx Curl 7.13.0
Haxx Curl 7.18.0
Haxx Curl 7.8.1
Haxx Curl 7.14.1
Haxx Curl 7.21.5
Haxx Curl 7.21.1
Haxx Curl 7.12.1
Haxx Curl 7.16.2
Haxx Curl 7.7.3
Haxx Curl 7.9.7
Haxx Curl 7.9.6
Haxx Curl 7.17.1
Haxx Curl 7.19.1
Haxx Curl 7.10.4
Haxx Curl 7.12.2
Haxx Curl 7.15.2
NA
CVE-2011-3201
GNOME Evolution prior to 3.2.3 allows user-assisted remote malicious users to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Oracle Solaris 11.2
Gnome Evolution 2.4
Gnome Evolution 2.0.1
Gnome Evolution 2.3.6
Gnome Evolution 1.11
Gnome Evolution 1.5
Gnome Evolution 1.2.4
Gnome Evolution 1.4.5
Gnome Evolution 1.4.6
Gnome Evolution 2.0.2
Gnome Evolution 2.12.3
Gnome Evolution 2.3.5
Gnome Evolution 1.4.4
Gnome Evolution 2.24.5
Gnome Evolution 2.26.1
Gnome Evolution 1.2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.2
Gnome Evolution 2.6
Gnome Evolution 1.0.8
Gnome Evolution 2.22.1
Gnome Evolution
NA
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
NA
CVE-2008-1767
Buffer overflow in pattern.c in libxslt prior to 1.1.24 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large ...
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop Workstation 5
Redhat Desktop 3
Redhat Enterprise Linux Desktop 5
Redhat Enterprise Linux 4.0
1 EDB exploit
NA
CVE-2007-5365
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 up to and including 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote malicious users to execute arbitrary code or cause a denial of service (daemon crash) via...
Sun Opensolaris Snv 36
Sun Opensolaris Snv 30
Sun Opensolaris Snv 70
Sun Opensolaris Snv 33
Sun Opensolaris Snv 101
Sun Opensolaris Snv 90
Sun Opensolaris Snv 93
Sun Opensolaris Snv 85
Sun Opensolaris Snv 57
Sun Opensolaris Snv 87
Openbsd Openbsd 4.1
Sun Opensolaris Snv 26
Sun Opensolaris Snv 50
Redhat Enterprise Linux 2.1
Sun Opensolaris Snv 73
Sun Opensolaris Snv 72
Sun Opensolaris Snv 67
Ubuntu Ubuntu Linux 6.06
Sun Opensolaris Snv 91
Sun Opensolaris Snv 92
Sun Opensolaris Snv 01
Sun Opensolaris Snv 77
1 EDB exploit
NA
CVE-2007-2030
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 5.0
Redhat Enterprise Linux 3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »