Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 1.5 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2004-0686
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
Samba Samba
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
1000
VMScore
CVE-2004-0600
Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote malicious users to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.
Samba Samba 3.0.3
Samba Samba 3.0.2a
Samba Samba 3.0.2
Samba Samba 3.0.4
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
1 EDB exploit
890
VMScore
CVE-2004-0941
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and previous versions may allow remote malicious users to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabili...
Gd Graphics Library Gdlib 2.0.33
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 2.0.22
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 1.8.4
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.21
Gd Graphics Library Gdlib 2.0.28
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
515
VMScore
CVE-2004-0594
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote malicious users to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init func...
Openpkg Openpkg 2.0
Trustix Secure Linux 2.0
Hp Hp-ux B.11.23
Openpkg Openpkg 2.1
Hp Hp-ux B.11.11
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Hp Hp-ux B.11.00
Trustix Secure Linux 2.1
Debian Debian Linux 3.0
Hp Hp-ux B.11.22
Php Php 5.0.0
Php Php
1 EDB exploit
650
VMScore
CVE-2004-0493
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote malicious users to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large number...
Trustix Secure Linux 2.0
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Gentoo Linux 1.4
Trustix Secure Linux 2.1
Apache Http Server 2.0.47
Ibm Http Server 2.0.42.1
Avaya S8300 R2.0.0
Apache Http Server 2.0.49
Ibm Http Server 2.0.42
Ibm Http Server 2.0.47.1
Apache Http Server 2.0.48
Ibm Http Server 2.0.42.2
Avaya S8700 R2.0.0
Avaya S8500 R2.0.0
Ibm Http Server 2.0.47
2 EDB exploits
1000
VMScore
CVE-2004-0990
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in...
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 2.0.15
Openpkg Openpkg 2.1
Gd Graphics Library Gdlib 2.0.22
Openpkg Openpkg Current
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 1.8.4
Openpkg Openpkg 2.2
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.21
Gd Graphics Library Gdlib 2.0.28
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Suse Suse Linux 9.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
1 EDB exploit
215
VMScore
CVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Larry Wall Perl 5.8.0
Sgi Propack 3.0
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Suse Suse Linux 9.0
Ubuntu Ubuntu Linux 4.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Ibm Aix 5.3
Suse Suse Linux 8.0
Ibm Aix 5.2
Trustix Secure Linux 1.5
1 EDB exploit
1000
VMScore
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
445
VMScore
CVE-2004-0918
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache prior to 2.4.STABLE7 allows remote malicious users to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Squid Squid 2.5 .stable3
Squid Squid 2.1 Patch2
Squid Squid 2.4 .stable7
Openpkg Openpkg 2.1
Squid Squid 2.0 Patch2
Squid Squid 2.4 .stable2
Squid Squid 2.3 .stable4
Squid Squid 2.3 .stable5
Squid Squid 2.5 .stable5
Openpkg Openpkg Current
Squid Squid 3.0 Pre1
Squid Squid 2.5 .stable6
Openpkg Openpkg 2.2
Squid Squid 2.4 .stable6
Squid Squid 2.5 .stable1
Squid Squid 2.4
Squid Squid 2.5 .stable4
Squid Squid 3.0 Pre3
Squid Squid 3.0 Pre2
Redhat Fedora Core Core 2.0
Trustix Secure Linux 2.0
Ubuntu Ubuntu Linux 4.1
187
VMScore
CVE-2002-1319
The Linux kernel 2.4.20 and previous versions, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
Linux Linux Kernel 2.4.15
Trustix Secure Linux 1.1
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.16
Trustix Secure Linux 1.5
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.2.19
Trustix Secure Linux 1.2
Linux Linux Kernel 2.2.20
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »