Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.2 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Caldera Openlinux 2.2
Debian Debian Linux 2.2
Redhat Linux 5.1
Redhat Linux 6.0
Debian Debian Linux 2.1
Redhat Linux 5.2
7.2
CVSSv2
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 4.0
Redhat Linux 4.2
Caldera Openlinux 2.2
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Redhat Linux 4.1
Redhat Linux 5.0
1 EDB exploit
2.1
CVSSv2
CVE-2000-0633
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
Conectiva Linux 4.0
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.1
Conectiva Linux 4.2
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 6.2
Redhat Linux 6.1
Redhat Linux 6.2e
9.3
CVSSv2
CVE-1999-0704
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Bsdi Bsd Os 4.0.1
Freebsd Freebsd 3.1
Bsdi Bsd Os 3.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Redhat Linux 6.0
2 EDB exploits
7.5
CVSSv2
CVE-1999-0706
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Isc Inn 1.7.2
Isc Inn 2.1
Isc Inn 1.5.1
Isc Inn 1.7
Isc Inn 2.0
Isc Inn 2.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
7.2
CVSSv2
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 5.1
Redhat Linux 6.0
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 4.4
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 5.2
4.6
CVSSv2
CVE-1999-0234
Bash treats any character with a value of 255 as a command separator.
Yggdrasil Linux
Sgi Irix
Caldera Openlinux
Redhat Linux 3.0.3
Suse Suse Linux 4.2
7.5
CVSSv2
CVE-2000-0196
Buffer overflow in mhshow in the Linux nmh package allows remote malicious users to execute commands via malformed MIME headers in an email message.
Nmh Nmh 1.0.2
Redhat Linux 5.2
Redhat Linux 6.0
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Turbolinux Turbolinux 3.5b2
Turbolinux Turbolinux 4.4
10
CVSSv2
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
7.2
CVSSv2
CVE-1999-1182
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
Delix Dld 5.2
Redhat Linux 4.0
Redhat Linux 4.1
Caldera Openlinux Lite 1.1
Debian Debian Linux 4.0
Lst Lst Power Linux 2.2
Redhat Linux 4.2
Suse Suse Linux 5.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »