Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enterprise mrg vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2011-2189
net/core/net_namespace.c in the Linux kernel 2.6.32 and previous versions does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote malicious users to cause a denial of service (memory consumption) via requests to a daemo...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
Redhat Enterprise Mrg 2.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
1 EDB exploit
4.6
CVSSv2
CVE-2011-2925
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Redhat Enterprise Mrg 2.0
7.1
CVSSv2
CVE-2010-4526
Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 up to and including 2.6.33 allows remote malicious users to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, wh...
Linux Linux Kernel 2.6.11
Linux Linux Kernel
Redhat Enterprise Mrg 1.0
Vmware Esx 4.1
Vmware Esx 4.0
7.5
CVSSv2
CVE-2010-4179
The installation documentation for Red Hat Enterprise Messaging, Realtime and Grid (MRG) 1.3 recommends that Condor should be configured so that the MRG Management Console (cumin) can submit jobs for users, which creates a trusted channel with insufficient access control that all...
Redhat Enterprise Mrg 1.3
4
CVSSv2
CVE-2009-5006
The SessionAdapter::ExchangeHandlerImpl::checkAlternate function in broker/SessionAdapter.cpp in the C++ Broker component in Apache Qpid prior to 0.6, as used in Red Hat Enterprise MRG prior to 1.3 and other products, allows remote authenticated users to cause a denial of service...
Apache Qpid
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.1.1
5
CVSSv2
CVE-2009-5005
The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG prior to 1.3 and other products, allows remote malicious users to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
Apache Qpid
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.0.1
4.3
CVSSv2
CVE-2010-3083
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG prior to 1.2.2 and other products, when SSL is enabled, allows remote malicious users to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handsh...
Apache Qpid 0.6
Apache Qpid 0.5
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.0
4
CVSSv2
CVE-2010-3701
lib/MessageStoreImpl.cpp in Red Hat Enterprise MRG prior to 1.2.2 allows remote authenticated users to cause a denial of service (stack memory exhaustion and broker crash) via a large persistent message.
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.2
6.9
CVSSv2
CVE-2009-3547
Multiple race conditions in fs/pipe.c in the Linux kernel prior to 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
Linux Linux Kernel 2.6.32
Linux Linux Kernel
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Opensuse Opensuse 11.2
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 10
Vmware Esx 4.0
Vmware Vma 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
5 EDB exploits
1 Github repository
4.9
CVSSv2
CVE-2009-3620
The ATI Rage 128 (aka r128) driver in the Linux kernel prior to 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privilege...
Linux Linux Kernel
Fedoraproject Fedora 10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Redhat Mrg Realtime 1.0
Opensuse Opensuse 11.0
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Debuginfo 10
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7