Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-1491
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.
Redhat Linux 2.1
1 EDB exploit
4.9
CVSSv2
CVE-2007-2030
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 5.0
Redhat Enterprise Linux 3.0
5
CVSSv2
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
5
CVSSv2
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
7.5
CVSSv2
CVE-2004-0104
Multiple format string vulnerabilities in Metamail 2.7 and previous versions allow remote malicious users to execute arbitrary code.
Sgi Propack 2.3
Metamail Corporation Metamail
Sgi Propack 2.4
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
1 EDB exploit
7.5
CVSSv2
CVE-2004-0105
Multiple buffer overflows in Metamail 2.7 and previous versions allow remote malicious users to execute arbitrary code.
Sgi Propack 2.3
Metamail Corporation Metamail
Sgi Propack 2.4
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
10
CVSSv2
CVE-1999-0002
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Bsdi Bsd Os 1.1
Redhat Linux 2.0
Caldera Openlinux 1.2
Redhat Linux 5.1
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 2.1
Redhat Linux 4.2
1 EDB exploit
2 Github repositories
5
CVSSv2
CVE-2004-0111
gdk-pixbuf prior to 0.20 allows malicious users to cause a denial of service (crash) via a malformed bitmap (BMP) file.
Redhat Gdk Pixbuf 0.18.0-7
Sgi Propack 2.3
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.20
Sgi Propack 2.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
7.5
CVSSv2
CVE-2003-0689
The getgrouplist function in GNU libc (glibc) 2.2.4 and previous versions allows malicious users to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.
Redhat Enterprise Linux 2.1
10
CVSSv2
CVE-1999-0832
Buffer overflow in NFS server on Linux allows malicious users to execute commands via a long pathname.
Debian Debian Linux 2.1
Redhat Linux 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »