Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.2 vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2023-5981
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Gnu Gnutls 1.5.0
Redhat Linux 8.0
Redhat Linux 9.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
5.6
CVSSv3
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
1 EDB exploit
49 Github repositories
9 Articles
5.6
CVSSv3
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
1 EDB exploit
42 Github repositories
9 Articles
5.6
CVSSv3
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
41 Github repositories
8 Articles
5.6
CVSSv3
CVE-2005-0109
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as ...
Freebsd Freebsd 4.3
Sco Unixware 7.1.3
Redhat Enterprise Linux 2.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 5.3
Freebsd Freebsd 3.1
Redhat Enterprise Linux 4.0
Sco Unixware 7.1.4
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Redhat Enterprise Linux Desktop 3.0
Freebsd Freebsd 5.1
Ubuntu Ubuntu Linux 4.1
Freebsd Freebsd 4.4
Redhat Enterprise Linux 3.0
Freebsd Freebsd 4.8
Freebsd Freebsd 2.2.2
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 3.5
4.9
CVSSv3
CVE-2020-35513
A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new N...
Linux Linux Kernel 4.2
Redhat Enterprise Linux 7.0
4.4
CVSSv3
CVE-2023-5870
A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background...
Postgresql Postgresql 16.0
Postgresql Postgresql
Redhat Software Collections 1.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Eus 9.0
Redhat Enterprise Linux Eus 8.8
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
Redhat Enterprise Linux For Arm 64 8.0
Redhat Enterprise Linux For Power Little Endian Eus 9.2 Ppc64le
Redhat Codeready Linux Builder For Arm64 Eus 9.2 Aarch64
Redhat Codeready Linux Builder For Ibm Z Systems Eus 9.2 S390x
Redhat Codeready Linux Builder Eus For Power Little Endian Eus 9.2 Ppc64le
Redhat Codeready Linux Builder Eus 9.2
4.3
CVSSv3
CVE-2023-5868
A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type de...
Postgresql Postgresql 16.0
Postgresql Postgresql
Redhat Software Collections 1.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Eus 9.0
Redhat Enterprise Linux Eus 8.8
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
Redhat Enterprise Linux For Arm 64 8.0
Redhat Enterprise Linux For Power Little Endian Eus 9.2 Ppc64le
Redhat Codeready Linux Builder For Arm64 Eus 9.2 Aarch64
Redhat Codeready Linux Builder For Ibm Z Systems Eus 9.2 S390x
Redhat Codeready Linux Builder Eus For Power Little Endian Eus 9.2 Ppc64le
Redhat Codeready Linux Builder Eus 9.2
4.2
CVSSv3
CVE-2019-2996
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u221; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple...
Oracle Jdk 1.8.0
Oracle Jre 1.8.0
Netapp Snapmanager -
Netapp Oncommand Workflow Automation -
Netapp E-series Santricity Web Services Proxy -
Netapp E-series Santricity Storage Manager -
Netapp E-series Santricity Unified Manager -
Netapp E-series Santricity Os Controller
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Satellite 5.8
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.6
4.2
CVSSv3
CVE-2019-2797
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communicatio...
Oracle Mysql
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Redhat Software Collections 1.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »