Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 9.0 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2003-0434
Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote malicious users to execute arbitrary commands via shell metacharacters in an embedded hyperlink.
Adobe Acrobat 5.0.6
Xpdf Xpdf 1.1
Redhat Enterprise Linux 2.1
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux Corporate Server 2.1
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.0
Redhat Linux 7.2
Redhat Linux 7.3
1 EDB exploit
740
VMScore
CVE-2019-13272
In the Linux kernel prior to 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process rela...
Linux Linux Kernel
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 16.04
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux For Real Time 8
Netapp Aff A700s Firmware -
Netapp H410c Firmware -
Netapp H610s Firmware -
Netapp Steelstore Cloud Integrated Storage -
Netapp Service Processor -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp E-series Performance Analyzer -
Netapp Hci Compute Node -
Netapp E-series Santricity Os Controller
3 EDB exploits
17 Github repositories
740
VMScore
CVE-2005-0750
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 up to and including 2.4.30-rc1 and 2.6 up to and including 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Conectiva Linux 10.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Suse Suse Linux 1.0
Suse Suse Linux 9.3
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
4 EDB exploits
739
VMScore
CVE-2019-3846
A flaw that allowed an malicious user to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Netapp A700s Firmware -
Netapp Cn1610 Firmware -
Netapp H610s Firmware -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager For Vmware Vsphere
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
730
VMScore
CVE-2002-1155
Buffer overflow in KON kon2 0.3.9b and previous versions allows local users to execute arbitrary code via a long -Coding command line argument.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
2 EDB exploits
725
VMScore
CVE-2018-6084
Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS before 66.0.3359.117 allowed a local malicious user to execute arbitrary code via an executable file.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
1 EDB exploit
725
VMScore
CVE-2007-5365
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 up to and including 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote malicious users to execute arbitrary code or cause a denial of service (daemon crash) via...
Sun Solaris 10.0
Sun Opensolaris Snv 03
Sun Opensolaris Snv 06
Sun Opensolaris Snv 12
Sun Opensolaris Snv 13
Sun Opensolaris Snv 24
Sun Opensolaris Snv 23
Sun Opensolaris Snv 34
Openbsd Openbsd 4.2
Sun Solaris 8.0
Sun Opensolaris Snv 01
Sun Opensolaris Snv 08
Sun Opensolaris Snv 100
Sun Opensolaris Snv 101
Sun Opensolaris Snv 21
Sun Opensolaris Snv 20
Sun Opensolaris Snv 19
Sun Opensolaris Snv 22
Sun Opensolaris Snv 28
Sun Opensolaris Snv 31
Sun Opensolaris Snv 30
Sun Opensolaris Snv 44
1 EDB exploit
703
VMScore
CVE-2021-3752
A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from thi...
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux For Real Time 7
Redhat Enterprise Linux For Real Time For Nfv 7
Redhat Virtualization Host 4.0
Redhat Enterprise Linux 8.0
Redhat 3scale 2.0
Fedoraproject Fedora 34
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H300e Firmware -
Netapp H500e Firmware -
Netapp H700e Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Policy 22.2.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.1
695
VMScore
CVE-2019-9513
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consu...
Apple Swiftnio
Apache Traffic Server
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Synology Skynas -
Synology Diskstation Manager 6.2
Synology Vs960hd Firmware -
Fedoraproject Fedora 29
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Software Collections 1.0
Redhat Jboss Core Services 1.0
Redhat Enterprise Linux 8.0
Redhat Jboss Enterprise Application Platform 7.2.0
Redhat Quay 3.0.0
Redhat Openshift Service Mesh 1.0
Redhat Jboss Enterprise Application Platform 7.3.0
Oracle Graalvm 19.2.0
1 Article
695
VMScore
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer...
Apple Swiftnio
Apache Traffic Server
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 9.0
Synology Skynas -
Synology Diskstation Manager 6.2
Synology Vs960hd Firmware -
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Software Collections 1.0
Redhat Openshift Container Platform 3.9
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 3.10
Redhat Jboss Core Services 1.0
Redhat Enterprise Linux 8.0
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »