Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux 6.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-4203
WebM libvpx (aka the VP8 Codec SDK) prior to 0.9.5, as used in Google Chrome prior to 7.0.517.44, allows remote malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via invalid frames.
Google Chrome
Webmproject Libvpx
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
9.3
CVSSv2
CVE-2019-7837
Adobe Flash Player versions 32.0.0.171 and previous versions, 32.0.0.171 and previous versions, and 32.0.0.171 and previous versions have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player Desktop Runtime
Adobe Flash Player
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
10
CVSSv2
CVE-2011-2767
mod_perl 2.0 up to and including 2.0.10 allows malicious users to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP...
Apache Mod Perl
Debian Debian Linux 8.0
Redhat Enterprise Linux 7.4
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux 6.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux 7.3
Redhat Enterprise Linux 7.5
Redhat Enterprise Linux 7.6
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
4.3
CVSSv2
CVE-2016-9591
JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
Jasper Project Jasper
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Eus 7.4
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Eus 7.3
Debian Debian Linux 8.0
7.5
CVSSv2
CVE-2012-2665
Multiple heap-based buffer overflows in the XML manifest encryption tag parsing functionality in OpenOffice.org and LibreOffice prior to 3.5.5 allow remote malicious users to cause a denial of service and possibly execute arbitrary code via a crafted Open Document Text (.odt) fil...
Apache Openoffice
Libreoffice Libreoffice
Redhat Enterprise Linux 6.0
Canonical Ubuntu Linux 11.04
Redhat Enterprise Linux Server From Rhui 6 6.0
Redhat Enterprise Linux For Ibm Z Systems 6.0
Canonical Ubuntu Linux 11.10
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux For Power Big Endian 6.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
4.9
CVSSv2
CVE-2011-1083
The epoll implementation in the Linux kernel 2.6.37.2 and previous versions does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system ...
Linux Linux Kernel
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 11
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
1 EDB exploit
7.2
CVSSv2
CVE-2018-6084
Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS before 66.0.3359.117 allowed a local malicious user to execute arbitrary code via an executable file.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
1 EDB exploit
4.3
CVSSv2
CVE-2017-5101
Inappropriate implementation in Omnibox in Google Chrome before 60.0.3112.78 for Linux, Windows, and Mac allowed a remote malicious user to spoof the contents of the Omnibox via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
4.3
CVSSv2
CVE-2017-5105
Insufficient Policy Enforcement in Omnibox in Google Chrome before 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote malicious user to perform domain spoofing via IDN homographs in a crafted domain name.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2018-17472
Incorrect handling of googlechrome:// URL scheme on iOS in Intents in Google Chrome before 70.0.3538.67 allowed a remote malicious user to escape the <iframe> sandbox via a crafted HTML page.
Google Chrome
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »