Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enterprise mrg vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-3940
The Linux kernel up to and including 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition ...
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 6.0
Linux Linux Kernel 3.14
Linux Linux Kernel 3.14.3
Linux Linux Kernel 3.14.4
Linux Linux Kernel
Linux Linux Kernel 3.14.1
Linux Linux Kernel 3.14.2
NA
CVE-2011-4930
Multiple format string vulnerabilities in Condor 7.2.0 up to and including 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and pos...
Condor Project Condor 7.6.1
Condor Project Condor 7.2.3
Fedoraproject Fedora 16
Condor Project Condor 7.5.4
Condor Project Condor 7.6.3
Condor Project Condor 7.6.0
Condor Project Condor 7.3.2
Condor Project Condor 7.2.1
Condor Project Condor 7.2.0
Condor Project Condor 7.4.1
Condor Project Condor 7.3.0
Condor Project Condor 7.4.2
Condor Project Condor 7.2.2
Condor Project Condor 7.6.4
Condor Project Condor 7.6.2
Fedoraproject Fedora 15
Condor Project Condor 7.2.5
Condor Project Condor 7.4.0
Condor Project Condor 7.3.1
Condor Project Condor 7.2.4
Redhat Enterprise Mrg 1.3
Redhat Enterprise Mrg 2.0
NA
CVE-2009-5136
The policy definition evaluator in Condor prior to 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.
Condor Project Condor
Condor Project Condor 7.4.0
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg 1.2.2
NA
CVE-2013-1892
MongoDB prior to 2.0.9 and 2.2.x prior to 2.2.4 does not properly validate requests to the nativeHelper function in SpiderMonkey, which allows remote authenticated users to cause a denial of service (invalid memory access and server crash) or execute arbitrary code via a crafted ...
Mongodb Mongodb 1.8.0
Mongodb Mongodb 2.0.0
Mongodb Mongodb 2.0.6
Mongodb Mongodb 2.2.2
Mongodb Mongodb 1.2.0
Mongodb Mongodb 2.2.1
Mongodb Mongodb 2.2.0
Mongodb Mongodb 1.4.0
Mongodb Mongodb 2.0.1
Mongodb Mongodb 2.0.3
Mongodb Mongodb
Mongodb Mongodb 2.0.4
Mongodb Mongodb 2.2.3
Mongodb Mongodb 2.0.5
Mongodb Mongodb 1.6.0
Mongodb Mongodb 2.0.2
Mongodb Mongodb 2.0.7
Redhat Enterprise Mrg 2.3
2 EDB exploits
NA
CVE-2012-2125
RubyGems prior to 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote malicious users to observe or modify a gem during installation via a man-in-the-middle attack.
Rubygems Rubygems 1.8.19
Rubygems Rubygems 1.8.18
Rubygems Rubygems 1.8.10
Rubygems Rubygems 1.8.9
Rubygems Rubygems 1.8.2
Rubygems Rubygems 1.8.1
Rubygems Rubygems 1.8.17
Rubygems Rubygems 1.8.16
Rubygems Rubygems 1.8.15
Rubygems Rubygems 1.8.8
Rubygems Rubygems 1.8.7
Rubygems Rubygems 1.8.0
Rubygems Rubygems 1.8.21
Rubygems Rubygems 1.8.20
Rubygems Rubygems 1.8.12
Rubygems Rubygems 1.8.11
Rubygems Rubygems 1.8.4
Rubygems Rubygems 1.8.3
Rubygems Rubygems
Rubygems Rubygems 1.8.14
Rubygems Rubygems 1.8.13
Rubygems Rubygems 1.8.6
NA
CVE-2012-2126
RubyGems prior to 1.8.23 does not verify an SSL certificate, which allows remote malicious users to modify a gem during installation via a man-in-the-middle attack.
Rubygems Rubygems 1.8.19
Rubygems Rubygems 1.8.18
Rubygems Rubygems 1.8.11
Rubygems Rubygems 1.8.10
Rubygems Rubygems 1.8.3
Rubygems Rubygems 1.8.2
Rubygems Rubygems 1.8.21
Rubygems Rubygems 1.8.20
Rubygems Rubygems 1.8.13
Rubygems Rubygems 1.8.12
Rubygems Rubygems 1.8.5
Rubygems Rubygems 1.8.4
Rubygems Rubygems
Rubygems Rubygems 1.8.15
Rubygems Rubygems 1.8.14
Rubygems Rubygems 1.8.7
Rubygems Rubygems 1.8.6
Rubygems Rubygems 1.8.17
Rubygems Rubygems 1.8.16
Rubygems Rubygems 1.8.9
Rubygems Rubygems 1.8.8
Rubygems Rubygems 1.8.1
NA
CVE-2013-1909
The Python client in Apache Qpid prior to 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitra...
Redhat Enterprise Mrg 2.0
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.13
Apache Qpid 0.14
Apache Qpid 0.16
Apache Qpid 0.18
Apache Qpid
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.6
Apache Qpid 0.7
Apache Qpid 0.8
Apache Qpid 0.10
Apache Qpid 0.15
Apache Qpid 0.17
Apache Qpid 0.9
NA
CVE-2013-2164
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel up to and including 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
Linux Linux Kernel 3.0.37
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.2.12
Linux Linux Kernel 3.2.13
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.60
Linux Linux Kernel 3.0.64
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.52
Linux Linux Kernel 3.0.45
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.0.20
Linux Linux Kernel 3.0.15
Linux Linux Kernel 3.0.12
Linux Linux Kernel 3.1.9
Linux Linux Kernel 3.1.8
Linux Linux Kernel 3.1.7
Linux Linux Kernel 3.2
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.5
NA
CVE-2013-2015
The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel prior to 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate malicious users to cause a denial of service (system hang) via a crafted filesystem on re...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
NA
CVE-2013-2546
The report API in the crypto user configuration API in the Linux kernel up to and including 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »