Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1194
Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and previous versions allows malicious users to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux Desktop 4.0
NA
CVE-2004-0494
Multiple extfs backend scripts for GNOME virtual file system (VFS) prior to 1.0.1 may allow remote malicious users to perform certain unauthorized actions via a gnome-vfs URI.
Avaya Cvlan
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
NA
CVE-2008-1767
Buffer overflow in pattern.c in libxslt prior to 1.1.24 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large ...
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop Workstation 5
Redhat Desktop 3
Redhat Enterprise Linux Desktop 5
Redhat Enterprise Linux 4.0
1 EDB exploit
NA
CVE-2005-1918
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted malicious users to overwrite arbitrary files via a crafted tar file, probably involving &q...
Gnu Tar 1.13.25
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
NA
CVE-2005-1760
sysreport 1.3.15 and previous versions includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.
Redhat Sysreport 1.2
Redhat Sysreport 1.1
Redhat Sysreport 1.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 4.0
NA
CVE-2003-0857
The (1) ipq_read and (2) ipulog_read functions in iptables allow local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
NA
CVE-2003-0699
The C-Media PCI sound driver in Linux prior to 2.4.21 does not use the get_user function to access userspace, which crosses security boundaries and may facilitate the exploitation of vulnerabilities, a different vulnerability than CVE-2003-0700.
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
NA
CVE-2007-2030
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 5.0
Redhat Enterprise Linux 3.0
NA
CVE-2005-1061
The secure script in LogWatch prior to 2.6-2 allows malicious users to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processin...
Logwatch Logwatch 2.6.2
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
1 EDB exploit
NA
CVE-2003-0689
The getgrouplist function in GNU libc (glibc) 2.2.4 and previous versions allows malicious users to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.
Redhat Enterprise Linux 2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »