Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enterprise mrg vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-6460
Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
Nokogiri Nokogiri
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Cloudforms Management Engine 5.0
Redhat Enterprise Mrg 2.0
Redhat Openstack 3.0
Redhat Openstack 4.0
Redhat Satellite 6.0
Redhat Subscription Asset Manager -
4.4
CVSSv2
CVE-2011-4930
Multiple format string vulnerabilities in Condor 7.2.0 up to and including 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and pos...
Condor Project Condor 7.6.1
Condor Project Condor 7.2.3
Fedoraproject Fedora 16
Condor Project Condor 7.5.4
Condor Project Condor 7.6.3
Condor Project Condor 7.6.0
Condor Project Condor 7.3.2
Condor Project Condor 7.2.1
Condor Project Condor 7.2.0
Condor Project Condor 7.4.1
Condor Project Condor 7.3.0
Condor Project Condor 7.4.2
Condor Project Condor 7.2.2
Condor Project Condor 7.6.4
Condor Project Condor 7.6.2
Fedoraproject Fedora 15
Condor Project Condor 7.2.5
Condor Project Condor 7.4.0
Condor Project Condor 7.3.1
Condor Project Condor 7.2.4
Redhat Enterprise Mrg 1.3
Redhat Enterprise Mrg 2.0
6.9
CVSSv2
CVE-2009-3547
Multiple race conditions in fs/pipe.c in the Linux kernel prior to 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
Linux Linux Kernel 2.6.32
Linux Linux Kernel
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Opensuse Opensuse 11.2
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 10
Vmware Esx 4.0
Vmware Vma 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
5 EDB exploits
1 Github repository
5.8
CVSSv2
CVE-2012-2681
Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote malicious users to guess the session key.
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin
Trevor Mckay Cumin 0.1.3160-1
Trevor Mckay Cumin 0.1.5192-1
Redhat Enterprise Mrg 2.0
Trevor Mckay Cumin 0.1.4369-1
Trevor Mckay Cumin 0.1.4410-2
3.3
CVSSv2
CVE-2019-3459
A heap address information leak while using L2CAP_GET_CONF_OPT exists in the Linux kernel prior to 5.1-rc1.
Linux Linux Kernel
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Real Time 7
Redhat Enterprise Linux For Real Time For Nfv 7
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux For Real Time 8
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
5.8
CVSSv2
CVE-2013-1909
The Python client in Apache Qpid prior to 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitra...
Redhat Enterprise Mrg 2.0
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.13
Apache Qpid 0.14
Apache Qpid 0.16
Apache Qpid 0.18
Apache Qpid
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.6
Apache Qpid 0.7
Apache Qpid 0.8
Apache Qpid 0.10
Apache Qpid 0.15
Apache Qpid 0.17
Apache Qpid 0.9
6
CVSSv2
CVE-2013-1892
MongoDB prior to 2.0.9 and 2.2.x prior to 2.2.4 does not properly validate requests to the nativeHelper function in SpiderMonkey, which allows remote authenticated users to cause a denial of service (invalid memory access and server crash) or execute arbitrary code via a crafted ...
Mongodb Mongodb 1.8.0
Mongodb Mongodb 2.0.0
Mongodb Mongodb 2.0.6
Mongodb Mongodb 2.2.2
Mongodb Mongodb 1.2.0
Mongodb Mongodb 2.2.1
Mongodb Mongodb 2.2.0
Mongodb Mongodb 1.4.0
Mongodb Mongodb 2.0.1
Mongodb Mongodb 2.0.3
Mongodb Mongodb
Mongodb Mongodb 2.0.4
Mongodb Mongodb 2.2.3
Mongodb Mongodb 2.0.5
Mongodb Mongodb 1.6.0
Mongodb Mongodb 2.0.2
Mongodb Mongodb 2.0.7
Redhat Enterprise Mrg 2.3
2 EDB exploits
5
CVSSv2
CVE-2012-3467
Apache QPID 0.14, 0.16, and previous versions uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote malicious users to bypass authentication.
Apache Qpid
Apache Qpid 0.6
Apache Qpid 0.14
Apache Qpid 0.5
5
CVSSv2
CVE-2012-2680
Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, does not properly restrict access to resources, which allows remote malicious users to obtain sensitive information via unspecified vectors related to (1) "web pages," (2) &q...
Trevor Mckay Cumin 0.1.3160-1
Trevor Mckay Cumin 0.1.4369-1
Redhat Enterprise Mrg 2.0
Trevor Mckay Cumin 0.1.5137-5
Trevor Mckay Cumin 0.1.5054-1
Trevor Mckay Cumin 0.1.5037-1
Trevor Mckay Cumin 0.1.4410-2
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin 0.1.5137-4
Trevor Mckay Cumin 0.1.5137-3
Trevor Mckay Cumin 0.1.5137-2
Trevor Mckay Cumin 0.1.5033-1
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.5137-1
Trevor Mckay Cumin 0.1.5105-1
Trevor Mckay Cumin
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin 0.1.5192-1
Trevor Mckay Cumin 0.1.5092-1
Trevor Mckay Cumin 0.1.5068-1
7.5
CVSSv2
CVE-2012-2684
Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote malicious users to execute arbitrary SQL commands via the (1) agent or (2) object...
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin 0.1.5192-1
Trevor Mckay Cumin 0.1.5105-1
Trevor Mckay Cumin 0.1.5092-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.5137-2
Trevor Mckay Cumin 0.1.5137-1
Trevor Mckay Cumin
Trevor Mckay Cumin 0.1.3160-1
Redhat Enterprise Mrg 2.0
Trevor Mckay Cumin 0.1.5137-5
Trevor Mckay Cumin 0.1.5068-1
Trevor Mckay Cumin 0.1.5054-1
Trevor Mckay Cumin 0.1.4369-1
Trevor Mckay Cumin 0.1.4410-2
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin 0.1.5137-4
Trevor Mckay Cumin 0.1.5137-3
Trevor Mckay Cumin 0.1.5037-1
Trevor Mckay Cumin 0.1.5033-1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »