Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-0686
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
Samba Samba
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
10
CVSSv2
CVE-2004-0600
Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote malicious users to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.
Samba Samba 3.0.2
Samba Samba 3.0.2a
Samba Samba 3.0.3
Samba Samba 3.0.4
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Trustix Secure Linux 1.5
1 EDB exploit
5.1
CVSSv2
CVE-2005-3233
Multiple interpretation error in unspecified versions of Trustix Antivirus allows remote malicious users to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Wi...
Trustix Antivirus
4.6
CVSSv2
CVE-2000-0791
Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
Trustix Secure Linux 1.1
5
CVSSv2
CVE-2005-0384
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote malicious users to cause a denial of service (kernel crash) via a pppd client.
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Redhat Enterprise Linux 2.1
Trustix Secure Linux 2
Trustix Secure Linux 2.1
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Trustix Secure Linux 2.2
Ubuntu Ubuntu Linux 4.10
7.2
CVSSv2
CVE-2000-1009
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Redhat Linux 6.2
Trustix Secure Linux 1.1
2 EDB exploits
2.1
CVSSv2
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Linux Linux Kernel 2.4.0
Trustix Secure Linux 2.1
10
CVSSv2
CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote malicious users to execute arbitrary commands.
Caldera Openlinux Ebuilder 3.0
Caldera Openlinux Eserver 2.3
Redhat Linux 7.0
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
4 EDB exploits
7.5
CVSSv2
CVE-2004-0432
ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
Proftpd Project Proftpd 1.2.9
Gentoo Linux 1.1a
Gentoo Linux 1.2
Gentoo Linux 1.4
Trustix Secure Linux 2.0
Gentoo Linux 0.5
Gentoo Linux 0.7
Trustix Secure Linux 2.1
10
CVSSv2
CVE-2004-0941
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and previous versions may allow remote malicious users to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabili...
Gd Graphics Library Gdlib 2.0.22
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 1.8.4
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.33
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.28
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 2.0.21
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Trustix Secure Linux 1.5
Trustix Secure Linux 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26101
buffer overflow
CVE-2022-26766
CVE-2022-46689
CVE-2024-26124
CVE-2024-26059
firmware
hard-coded
CVE-2024-26118
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »