CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

redhat

enterprise_mrg

19 known vulnerabilities · sorted by CVSS score

CVE-2012-3460
CRITICAL9.8

cumin: At installation postgresql database user created without password

redhat / enterprise_mrg
Network
Published Nov 21, 2019
CVE-2018-16884
HIGH8.0

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

linux / linux_kernel+11
Adjacent
Published Dec 18, 2018
CVE-2017-7482
HIGH7.8

In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.

linux / linux_kernel+10
Local
Published Jul 30, 2018
CVE-2020-27786
HIGH7.8

A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

linux / linux_kernel+13
Local
Published Dec 11, 2020
CVE-2020-10757
HIGH7.8

A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.

linux / linux_kernel+17
Local
Published Jun 9, 2020
CVE-2019-11477
HIGH7.5

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

linux / linux_kernel+90
Network
Published Jun 19, 2019
CVE-2012-6685
HIGH7.5

Nokogiri before 1.5.4 is vulnerable to XXE attacks

nokogiri / nokogiri+8
Network
Published Feb 19, 2020
CVE-2020-1749
HIGH7.5

A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.

linux / linux_kernel+2
Network
Published Sep 9, 2020
CVE-2019-14898
HIGH7.0

The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.

linux / linux_kernel+1
Local
Published May 8, 2020
CVE-2019-3459
MEDIUM6.5

A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.

linux / linux_kernel+29
Adjacent
Published Apr 11, 2019
CVE-2013-6460
MEDIUM6.5

Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents

nokogiri / nokogiri+10
Network
Published Nov 5, 2019
CVE-2013-6461
MEDIUM6.5

Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits

nokogiri / nokogiri+10
Network
Published Nov 5, 2019
CVE-2020-27825
MEDIUM5.7

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

linux / linux_kernel+8
Local
Published Dec 11, 2020
CVE-2017-15127
MEDIUM5.5

A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG).

linux / linux_kernel+2
Local
Published Jan 14, 2018
CVE-2017-15128
MEDIUM5.5

A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).

linux / linux_kernel+2
Local
Published Jan 14, 2018
CVE-2014-8171
MEDIUM5.5

The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup.

linux / linux_kernel+3
Local
Published Feb 9, 2018
CVE-2014-8181
MEDIUM5.5

The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.

redhat / enterprise_linux+1
Local
Published Nov 6, 2019
CVE-2019-11478
MEDIUM5.3

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

linux / linux_kernel+89
Network
Published Jun 19, 2019
CVE-2020-12826
MEDIUM5.3

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

linux / linux_kernel+6
Local
Published May 12, 2020