Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-1491
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.
Redhat Linux 2.1
1 EDB exploit
NA
CVE-2007-2030
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Redhat Fedora Core Core 5.0
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
NA
CVE-2003-0689
The getgrouplist function in GNU libc (glibc) 2.2.4 and previous versions allows malicious users to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.
Redhat Enterprise Linux 2.1
NA
CVE-2004-0104
Multiple format string vulnerabilities in Metamail 2.7 and previous versions allow remote malicious users to execute arbitrary code.
Sgi Propack 2.3
Sgi Propack 2.4
Metamail Corporation Metamail
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 2.1
1 EDB exploit
NA
CVE-2004-0105
Multiple buffer overflows in Metamail 2.7 and previous versions allow remote malicious users to execute arbitrary code.
Sgi Propack 2.3
Sgi Propack 2.4
Metamail Corporation Metamail
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 2.1
NA
CVE-1999-0002
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Caldera Openlinux 1.2
Redhat Linux 2.1
Bsdi Bsd Os 1.1
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 2.0
Redhat Linux 3.0.3
Redhat Linux 5.1
1 EDB exploit
2 Github repositories
NA
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
NA
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
NA
CVE-2004-0111
gdk-pixbuf prior to 0.20 allows malicious users to cause a denial of service (crash) via a malformed bitmap (BMP) file.
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.20
Sgi Propack 2.4
Redhat Gdk Pixbuf 0.18.0-7
Sgi Propack 2.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Linux Advanced Workstation 2.1
NA
CVE-1999-0832
Buffer overflow in NFS server on Linux allows malicious users to execute commands via a long pathname.
Debian Debian Linux 2.1
Redhat Linux 5.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »