Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise mrg 2.0 vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Redhat Linux 7.2
Linux Linux Kernel -
Redhat Enterprise Mrg 2.0
2.1
CVSSv2
CVE-2015-1350
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system...
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.0
4
CVSSv2
CVE-2014-3940
The Linux kernel up to and including 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition ...
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 6.0
Linux Linux Kernel 3.14
Linux Linux Kernel 3.14.3
Linux Linux Kernel 3.14.4
Linux Linux Kernel
Linux Linux Kernel 3.14.1
Linux Linux Kernel 3.14.2
4.4
CVSSv2
CVE-2011-4930
Multiple format string vulnerabilities in Condor 7.2.0 up to and including 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and pos...
Condor Project Condor 7.6.1
Condor Project Condor 7.2.3
Fedoraproject Fedora 16
Condor Project Condor 7.5.4
Condor Project Condor 7.6.3
Condor Project Condor 7.6.0
Condor Project Condor 7.3.2
Condor Project Condor 7.2.1
Condor Project Condor 7.2.0
Condor Project Condor 7.4.1
Condor Project Condor 7.3.0
Condor Project Condor 7.4.2
Condor Project Condor 7.2.2
Condor Project Condor 7.6.4
Condor Project Condor 7.6.2
Fedoraproject Fedora 15
Condor Project Condor 7.2.5
Condor Project Condor 7.4.0
Condor Project Condor 7.3.1
Condor Project Condor 7.2.4
Redhat Enterprise Mrg 1.3
Redhat Enterprise Mrg 2.0
5.8
CVSSv2
CVE-2013-1909
The Python client in Apache Qpid prior to 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitra...
Redhat Enterprise Mrg 2.0
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.13
Apache Qpid 0.14
Apache Qpid 0.16
Apache Qpid 0.18
Apache Qpid
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.6
Apache Qpid 0.7
Apache Qpid 0.8
Apache Qpid 0.10
Apache Qpid 0.15
Apache Qpid 0.17
Apache Qpid 0.9
2.1
CVSSv2
CVE-2013-2164
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel up to and including 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
Linux Linux Kernel 3.0.37
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.2.12
Linux Linux Kernel 3.2.13
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.60
Linux Linux Kernel 3.0.64
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.52
Linux Linux Kernel 3.0.45
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.0.20
Linux Linux Kernel 3.0.15
Linux Linux Kernel 3.0.12
Linux Linux Kernel 3.1.9
Linux Linux Kernel 3.1.8
Linux Linux Kernel 3.1.7
Linux Linux Kernel 3.2
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.5
4.7
CVSSv2
CVE-2013-2015
The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel prior to 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate malicious users to cause a denial of service (system hang) via a crafted filesystem on re...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
2.1
CVSSv2
CVE-2013-2546
The report API in the crypto user configuration API in the Linux kernel up to and including 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
2.1
CVSSv2
CVE-2013-2547
The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel up to and including 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap mem...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
2.1
CVSSv2
CVE-2013-2548
The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel up to and including 3.8.2 uses an incorrect length value during a copy operation, which allows local users to obtain sensitive information from kernel...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »