Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux advanced workstation 2.1 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2005-1194
Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and previous versions allows malicious users to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop 3.0
505
VMScore
CVE-2005-1061
The secure script in LogWatch prior to 2.6-2 allows malicious users to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processin...
Logwatch Logwatch 2.6.2
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
1 EDB exploit
329
VMScore
CVE-2005-0988
Race condition in gzip 1.2.4, 1.3.3, and previous versions, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompressio...
Gnu Gzip 1.2.4
Gnu Gzip 1.2.4a
Gnu Gzip 1.3.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Turbolinux Turbolinux Appliance Server 1.0 Hosting
Turbolinux Turbolinux Appliance Server 1.0 Workgroup
Ubuntu Ubuntu Linux 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.8
409
VMScore
CVE-2005-0078
The KDE screen saver in KDE prior to 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Debian Debian Linux 3.0
Kde Kde 1.0
Kde Kde 2.1 Beta2
Kde Kde 2.2
Kde Kde 3.0.4
Kde Kde 3.0 Beta 1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2.1
Kde Kde 2.2 Beta1
Kde Kde 3.0 Beta 2
Redhat Enterprise Linux 2.1
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 2.1
Kde Kde 2.1 Beta1
668
VMScore
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.4 5
Easy Software Products Cups 1.1.6
Kde Koffice 1.3.3
Kde Koffice 1.3 Beta1
Pdftohtml Pdftohtml 0.33a
Pdftohtml Pdftohtml 0.34
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Ascii Ptex 3.1.4
Cstex Cstetex 2.0.2
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3
445
VMScore
CVE-2004-1092
Midnight commander (mc) 4.5.55 and previous versions allows remote malicious users to cause a denial of service by causing mc to free unallocated memory.
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Suse Suse Linux 8.0
668
VMScore
CVE-2004-1004
Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Debian Debian Linux 3.0
Gentoo Linux
Suse Suse Linux 8.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Workstation 7.0
Redhat Enterprise Linux 2.1
668
VMScore
CVE-2004-1005
Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Gentoo Linux
445
VMScore
CVE-2004-1009
Midnight commander (mc) 4.5.55 and previous versions allows remote malicious users to cause a denial of service (infinite loop) via unknown attack vectors.
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Debian Debian Linux 3.0
Gentoo Linux
Suse Suse Linux 8.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Workstation 7.0
Redhat Linux Advanced Workstation 2.1
445
VMScore
CVE-2004-1090
Midnight commander (mc) 4.5.55 and previous versions allows remote malicious users to cause a denial of service via "a corrupt section header."
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »