Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0337
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote malicious users to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Wietse Venema Postfix 2.1.3
Redhat Enterprise Linux 4.0
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Redhat Enterprise Linux Desktop 4.0
Suse Suse Linux 9.2
9.8
CVSSv3
CVE-2011-2897
gdk-pixbuf up to and including 2.31.1 has GIF loader buffer overflow when initializing decompression tables due to an input validation flaw
Gnome Gdk-pixbuf
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 5.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2021-3677
A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include...
Postgresql Postgresql
Redhat Virtualization 4.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Ibm Z Systems 8.0
Redhat Software Collections 1.0
Fedoraproject Fedora 34
NA
CVE-2005-0699
Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and previous versions allow remote malicious users to execute arbitrary code via RADIUS authentication packets with large length values.
Conectiva Linux 9.0
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Ethereal Group Ethereal 0.10.7
Ethereal Group Ethereal 0.10.5
Conectiva Linux 10.0
Ethereal Group Ethereal 0.10.6
Ethereal Group Ethereal 0.10.8
Ethereal Group Ethereal 0.10.9
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Altlinux Alt Linux Compact 2.3
Altlinux Alt Linux Junior 2.3
Redhat Enterprise Linux Desktop 4.0
8.2
CVSSv3
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols ...
Cloudbase Open Vswitch 3.1.0
Cloudbase Open Vswitch
Debian Debian Linux 11.0
Redhat Virtualization 4.0
Redhat Openshift Container Platform 4.0
Redhat Openstack Platform 16.1
Redhat Openstack Platform 16.2
Redhat Openstack Platform 17.0
Redhat Fast Datapath -
NA
CVE-2007-6284
The xmlCurrentChar function in libxml2 prior to 2.6.31 allows context-dependent malicious users to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
Mandrakesoft Mandrake Linux Corporate Server 4.0
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Redhat Fedora 7
Mandrakesoft Mandrake Linux 2007
Redhat Fedora 8
Mandrakesoft Mandrake Linux 2007.1
Mandrakesoft Mandrake Linux Corporate Server 3.0
Mandrakesoft Mandrake Linux 2008.0
NA
CVE-1999-1572
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Mandrakesoft Mandrake Linux Cs3.0
Redhat Enterprise Linux 4.0
Debian Debian Linux 3.0
Freebsd Freebsd 2.1.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 10.1
Redhat Enterprise Linux Desktop 4.0
Ubuntu Ubuntu Linux 4.10
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Cs2.1
7.5
CVSSv3
CVE-2021-20270
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
Pygments Pygments
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 4.0
Redhat Openstack Platform 10.0
Redhat Software Collections -
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 Github repository
NA
CVE-2005-0736
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Conectiva Linux 10.0
Linux Linux Kernel 2.6.11
Redhat Fedora Core Core 2.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Redhat Enterprise Linux Desktop 4.0
Redhat Fedora Core Core 3.0
Linux Linux Kernel 2.6.6
2 EDB exploits
5.5
CVSSv3
CVE-2021-20297
A flaw was found in NetworkManager in versions prior to 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.
Gnome Networkmanager
Redhat Openshift Container Platform 4.0
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 33
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »