Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux vulnerabilities and exploits
(subscribe to this query)
3.6
CVSSv2
CVE-2011-1182
kernel/signal.c in the Linux kernel prior to 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
6.8
CVSSv2
CVE-2016-3492
Unspecified vulnerability in Oracle MySQL 5.5.51 and previous versions, 5.6.32 and previous versions, and 5.7.14 and previous versions allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
Oracle Mysql
Mariadb Mariadb
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
4
CVSSv2
CVE-2016-5612
Unspecified vulnerability in Oracle MySQL 5.5.50 and previous versions, 5.6.31 and previous versions, and 5.7.13 and previous versions allows remote authenticated users to affect availability via vectors related to DML.
Oracle Mysql
Mariadb Mariadb
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.7
4
CVSSv2
CVE-2016-5624
Unspecified vulnerability in Oracle MySQL 5.5.51 and previous versions allows remote authenticated users to affect availability via vectors related to DML.
Oracle Mysql
Mariadb Mariadb
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Server Tus 7.6
4
CVSSv2
CVE-2016-5629
Unspecified vulnerability in Oracle MySQL 5.5.51 and previous versions, 5.6.32 and previous versions, and 5.7.14 and previous versions allows remote administrators to affect availability via vectors related to Server: Federated.
Oracle Mysql
Mariadb Mariadb
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Eus 7.6
6.4
CVSSv2
CVE-1999-0740
Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.
Redhat Linux 5.2
Redhat Linux 4.2
Redhat Linux 6.0
7.2
CVSSv2
CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Redhat Linux 6.0
Redhat Linux 6.2
Redhat Linux 6.1
1 EDB exploit
7.5
CVSSv2
CVE-2001-1002
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and previous versions does not run dvips in secure mode when dvips is executed by lpd, which could allow remote malicious users to gain privileges by printing a DVI file that contains malicious command...
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
1 EDB exploit
1 Github repository
2.1
CVSSv2
CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an malicious user to cause a denial of service via a malformed request.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
2.1
CVSSv2
CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »