Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle linux 6 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2011-3544
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and previous versions allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unkn...
Sun Jre 1.7.0
Sun Jdk 1.7.0
Sun Jre 1.6.0
Sun Jdk 1.6.0
Sun Jre
Sun Jdk
1 EDB exploit
1 Github repository
15 Articles
9.3
CVSSv2
CVE-2016-5582
Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
Oracle Jdk 1.8.0
Oracle Jdk 1.7.0
Oracle Jdk 1.6.0
Oracle Jre 1.6.0
Oracle Jre 1.7.0
Oracle Jre 1.8.0
9.3
CVSSv2
CVE-2016-3587
Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to Hotspot.
Oracle Linux 6
Oracle Linux 7
Oracle Jdk 1.8.0
Oracle Jre 1.8.0
9.3
CVSSv2
CVE-2016-3610
Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.
Oracle Jdk 1.8.0
Oracle Jre 1.8.0
Oracle Linux 5.0
Oracle Linux 6
Oracle Linux 7
9.3
CVSSv2
CVE-2016-3598
Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
Oracle Jdk 1.8.0
Oracle Jre 1.8.0
Oracle Linux 5.0
Oracle Linux 6
Oracle Linux 7
9.3
CVSSv2
CVE-2016-2794
The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 prior to 1.3.6, as used in Mozilla Firefox prior to 45.0 and Firefox ESR 38.x prior to 38.7, allows remote malicious users to cause a denial of service (buffer over-read) or possibly have unspecified other...
Mozilla Firefox Esr 38.6.0
Mozilla Firefox Esr 38.5.1
Mozilla Firefox Esr 38.1.0
Mozilla Firefox Esr 38.0.5
Mozilla Firefox Esr 38.0.1
Mozilla Firefox
Mozilla Firefox Esr 38.6.1
Mozilla Firefox Esr 38.2.0
Mozilla Firefox Esr 38.1.1
Mozilla Firefox Esr 38.3.0
Mozilla Firefox Esr 38.2.1
Mozilla Firefox Esr 38.5.0
Mozilla Firefox Esr 38.4.0
Mozilla Firefox Esr 38.0
Sil Graphite2
Suse Linux Enterprise 12.0
Opensuse Opensuse 13.1
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Oracle Linux 6
Oracle Linux 7
Oracle Linux 5.0
9.3
CVSSv2
CVE-2016-2799
Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 prior to 1.3.6, as used in Mozilla Firefox prior to 45.0 and Firefox ESR 38.x prior to 38.7, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via ...
Oracle Linux 5.0
Oracle Linux 7
Oracle Linux 6
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Suse Linux Enterprise 12.0
Opensuse Leap 42.1
Mozilla Firefox Esr 38.3.0
Mozilla Firefox Esr 38.2.1
Mozilla Firefox Esr 38.5.0
Mozilla Firefox Esr 38.4.0
Mozilla Firefox Esr 38.0.1
Mozilla Firefox Esr 38.0
Mozilla Firefox Esr 38.6.0
Mozilla Firefox Esr 38.5.1
Mozilla Firefox Esr 38.1.0
Mozilla Firefox Esr 38.0.5
Mozilla Firefox
Mozilla Firefox Esr 38.6.1
Mozilla Firefox Esr 38.2.0
Mozilla Firefox Esr 38.1.1
Sil Graphite2
9.3
CVSSv2
CVE-2011-3551
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and previous versions, and JRockit R28.1.4 and previous versions allows remote malicious users to affect confidentiality, integrity, and availability via unknown vecto...
Sun Jdk 1.7.0
Sun Jre 1.7.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.0
Oracle Jrockit R28.0.2
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.0
Oracle Jrockit
Oracle Jrockit R28.1.3
Sun Jre 1.6.0
Sun Jdk 1.6.0
Sun Jre
Sun Jdk
9.3
CVSSv2
CVE-2010-1423
Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote malicious users to execute arbitrary code via the (1) -J or (2) -...
Oracle Jre 1.6.0
Oracle Jdk 1.6.0
Oracle Jdk
Oracle Jre
1 EDB exploit
1 Article
7.8
CVSSv2
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer...
Apple Swiftnio
Apache Traffic Server
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 9.0
Synology Skynas -
Synology Diskstation Manager 6.2
Synology Vs960hd Firmware -
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Software Collections 1.0
Redhat Openshift Container Platform 3.9
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 3.10
Redhat Jboss Core Services 1.0
Redhat Enterprise Linux 8.0
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »