Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat discovery - vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2020-1712
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate thei...
Systemd Project Systemd
Redhat Enterprise Linux 8.0
Redhat Openshift Container Platform 4.0
Redhat Discovery -
Redhat Migration Toolkit 1.0
Redhat Ceph Storage 4.0
Debian Debian Linux 9.0
1 Github repository
1 Article
5.5
CVSSv3
CVE-2021-3684
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the re...
Redhat Openshift Assisted Installer
Redhat Openshift Container Platform 4.6
8.1
CVSSv3
CVE-2016-3698
libndp prior to 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote malicious users to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertis...
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Aus 7.2
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.2
Redhat Enterprise Linux Hpc Node Eus 7.2
Libndp Libndp
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
4.7
CVSSv3
CVE-2019-15807
In the Linux kernel prior to 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Debian Debian Linux 8.0
Redhat Enterprise Linux 8.0
5.9
CVSSv3
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH prior to 9.6 and other products, allows remote malicious users to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may conseque...
Openbsd Openssh
Putty Putty
Filezilla-project Filezilla Client
Microsoft Powershell
Panic Transmit 5
Panic Nova
Roumenpetrov Pkixssh
Winscp Winscp
Bitvise Ssh Client
Bitvise Ssh Server
Lancom-systems Lcos
Lancom-systems Lcos Fx -
Lancom-systems Lcos Lx -
Lancom-systems Lcos Sx 5.20
Lancom-systems Lcos Sx 4.20
Lancom-systems Lanconfig -
Vandyke Securecrt
Libssh Libssh
Net-ssh Net-ssh 7.2.0
Ssh2 Project Ssh2
Proftpd Proftpd
Freebsd Freebsd
8 Github repositories
1 Article
NA
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
7.7
CVSSv3
CVE-2020-15114
In etcd prior to 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of...
Redhat Etcd
Fedoraproject Fedora 32
5.7
CVSSv3
CVE-2021-0129
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
Bluez Bluez
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Debian Debian Linux 9.0
NA
CVE-2011-1002
avahi-core/socket.c in avahi-daemon in Avahi prior to 0.6.29 allows remote malicious users to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Avahi Avahi 0.6.25
Avahi Avahi 0.6.5
Avahi Avahi 0.6.20
Avahi Avahi 0.6.19
Avahi Avahi 0.5.2
Avahi Avahi 0.6.1
Avahi Avahi 0.6.13
Avahi Avahi 0.6.15
Avahi Avahi 0.6.7
Avahi Avahi 0.6.17
Avahi Avahi 0.6.16
Avahi Avahi 0.3
Avahi Avahi
Avahi Avahi 0.6.24
Avahi Avahi 0.6.23
Avahi Avahi 0.6.9
Avahi Avahi 0.2
Avahi Avahi 0.1
Avahi Avahi 0.6.14
Avahi Avahi 0.6.10
Avahi Avahi 0.6.27
Avahi Avahi 0.6.6
2 Nmap scripts
4 Github repositories
8.8
CVSSv3
CVE-2018-1258
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
Pivotal Software Spring Security
Vmware Spring Framework 5.0.5
Oracle Agile Plm 9.3.3
Oracle Agile Plm 9.3.4
Oracle Agile Plm 9.3.5
Oracle Agile Plm 9.3.6
Oracle Application Testing Suite 10.1
Oracle Application Testing Suite 12.5.0.3
Oracle Application Testing Suite 13.1.0.1
Oracle Application Testing Suite 13.2.0.1
Oracle Application Testing Suite 13.3.0.1
Oracle Big Data Discovery 1.6.0
Oracle Communications Converged Application Server
Oracle Communications Diameter Signaling Router
Oracle Communications Network Integrity
Oracle Communications Performance Intelligence Center
Oracle Communications Services Gatekeeper
Oracle Endeca Information Discovery Integrator 3.1.0
Oracle Endeca Information Discovery Integrator 3.2.0
Oracle Enterprise Manager For Mysql Database 13.2
Oracle Enterprise Manager Ops Center 12.2.2
Oracle Enterprise Manager Ops Center 12.3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »