Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 2.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0686
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
Samba Samba
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
NA
CVE-2005-0384
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote malicious users to cause a denial of service (kernel crash) via a pppd client.
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Redhat Enterprise Linux 2.1
Ubuntu Ubuntu Linux 4.10
Trustix Secure Linux 2
Suse Suse Linux 9.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
NA
CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file prior to 4.12 allows malicious users to execute arbitrary code via a crafted ELF file.
File File 4.7
File File 4.5
File File 4.4
File File 4.1
File File 4.10
File File 4.2
File File 4.9
File File 4.6
File File 4.3
File File 4.8
File File 4.0
File File 4.11
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Gentoo Linux
1 EDB exploit
NA
CVE-2004-0941
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and previous versions may allow remote malicious users to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabili...
Gd Graphics Library Gdlib 2.0.33
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 2.0.22
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 1.8.4
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.21
Gd Graphics Library Gdlib 2.0.28
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
NA
CVE-2004-0990
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in...
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 2.0.15
Openpkg Openpkg 2.1
Gd Graphics Library Gdlib 2.0.22
Openpkg Openpkg Current
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 1.8.4
Openpkg Openpkg 2.2
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.21
Gd Graphics Library Gdlib 2.0.28
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Suse Suse Linux 9.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
1 EDB exploit
NA
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Suse Suse Linux 6.3
Debian Debian Linux 2.3
Debian Debian Linux 2.2
Trustix Secure Linux 1.1
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
Trustix Secure Linux 1.0
Suse Suse Linux 6.4
Suse Suse Linux 7.0
3 EDB exploits
NA
CVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Larry Wall Perl 5.8.0
Sgi Propack 3.0
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Suse Suse Linux 9.0
Ubuntu Ubuntu Linux 4.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Ibm Aix 5.3
Suse Suse Linux 8.0
Ibm Aix 5.2
Trustix Secure Linux 1.5
1 EDB exploit
NA
CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.9.1
Lbl Tcpdump 3.8.2
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5 Alpha
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.4
Lbl Tcpdump 3.8.3
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.9
Lbl Tcpdump 3.8.1
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 10.2
Mandrakesoft Mandrake Linux 10.1
Redhat Fedora Core Core 4.0
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Redhat Fedora Core Core 3.0
1 EDB exploit
NA
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Debian Debian Linux 2.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Slackware Slackware Linux
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
NA
CVE-2001-0169
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Turbolinux Turbolinux
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Turbolinux Turbolinux 6.1
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »