Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 2.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-0801
Unknown vulnerability in foomatic-rip in Foomatic prior to 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
Conectiva Linux 9.0
Linuxprinting.org Foomatic-filters 3.1
Linuxprinting.org Foomatic-filters 3.0.1
Sun Java Desktop System 2003
Sun Java Desktop System 2.0
Linuxprinting.org Foomatic-filters 3.0
Linuxprinting.org Foomatic-filters 3.0.2
Conectiva Linux 10.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
10
CVSSv2
CVE-2004-0990
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in...
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 2.0.15
Openpkg Openpkg 2.1
Gd Graphics Library Gdlib 2.0.22
Openpkg Openpkg Current
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 1.8.4
Openpkg Openpkg 2.2
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.21
Gd Graphics Library Gdlib 2.0.28
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Suse Suse Linux 9.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
1 EDB exploit
6.4
CVSSv2
CVE-2004-0493
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote malicious users to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large number...
Trustix Secure Linux 2.0
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Gentoo Linux 1.4
Trustix Secure Linux 2.1
Apache Http Server 2.0.47
Ibm Http Server 2.0.42.1
Avaya S8300 R2.0.0
Apache Http Server 2.0.49
Ibm Http Server 2.0.42
Ibm Http Server 2.0.47.1
Apache Http Server 2.0.48
Ibm Http Server 2.0.42.2
Avaya S8700 R2.0.0
Avaya S8500 R2.0.0
Ibm Http Server 2.0.47
2 EDB exploits
5
CVSSv2
CVE-2004-0918
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache prior to 2.4.STABLE7 allows remote malicious users to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Squid Squid 2.5 .stable3
Squid Squid 2.1 Patch2
Squid Squid 2.4 .stable7
Openpkg Openpkg 2.1
Squid Squid 2.0 Patch2
Squid Squid 2.4 .stable2
Squid Squid 2.3 .stable4
Squid Squid 2.3 .stable5
Squid Squid 2.5 .stable5
Openpkg Openpkg Current
Squid Squid 3.0 Pre1
Squid Squid 2.5 .stable6
Openpkg Openpkg 2.2
Squid Squid 2.4 .stable6
Squid Squid 2.5 .stable1
Squid Squid 2.4
Squid Squid 2.5 .stable4
Squid Squid 3.0 Pre3
Squid Squid 3.0 Pre2
Redhat Fedora Core Core 2.0
Trustix Secure Linux 2.0
Ubuntu Ubuntu Linux 4.1
2.1
CVSSv2
CVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Larry Wall Perl 5.8.0
Sgi Propack 3.0
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Suse Suse Linux 9.0
Ubuntu Ubuntu Linux 4.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Ibm Aix 5.3
Suse Suse Linux 8.0
Ibm Aix 5.2
Trustix Secure Linux 1.5
1 EDB exploit
5
CVSSv2
CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.9.1
Lbl Tcpdump 3.8.2
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5 Alpha
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.4
Lbl Tcpdump 3.8.3
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.9
Lbl Tcpdump 3.8.1
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 10.2
Mandrakesoft Mandrake Linux 10.1
Redhat Fedora Core Core 4.0
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Redhat Fedora Core Core 3.0
1 EDB exploit
10
CVSSv2
CVE-2004-0989
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote malicious users to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data...
Xmlsoft Libxml2 2.6.11
Xmlsoft Libxml2 2.6.13
Xmlsoft Libxml2 2.6.7
Xmlsoft Libxml2 2.6.14
Xmlstarlet Command Line Xml Toolkit 0.9.1
Xmlsoft Libxml2 2.6.8
Xmlsoft Libxml2 2.5.11
Xmlsoft Libxml 1.8.17
Xmlsoft Libxml2 2.6.12
Xmlsoft Libxml2 2.6.9
Xmlsoft Libxml2 2.6.6
Redhat Fedora Core Core 2.0
Trustix Secure Linux 2.0
Ubuntu Ubuntu Linux 4.1
Trustix Secure Linux 2.1
1 EDB exploit
7.2
CVSSv2
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Debian Debian Linux 2.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Slackware Slackware Linux
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
7.2
CVSSv2
CVE-2004-1051
sudo prior to 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
Todd Miller Sudo 1.5.8
Todd Miller Sudo 1.6.3 P6
Todd Miller Sudo 1.5.9
Todd Miller Sudo 1.6.6
Todd Miller Sudo 1.6.3
Todd Miller Sudo 1.6.4 P2
Todd Miller Sudo 1.6.1
Todd Miller Sudo 1.6.3 P5
Todd Miller Sudo 1.5.7
Todd Miller Sudo 1.6.2
Todd Miller Sudo 1.6.8
Todd Miller Sudo 1.6.4 P1
Todd Miller Sudo 1.6.3 P2
Todd Miller Sudo 1.6.3 P4
Todd Miller Sudo 1.6.5 P2
Todd Miller Sudo 1.6.5
Todd Miller Sudo 1.6.3 P3
Todd Miller Sudo 1.6.8 P1
Todd Miller Sudo 1.6.5 P1
Todd Miller Sudo 1.6.3 P7
Todd Miller Sudo 1.6
Todd Miller Sudo 1.6.4
5
CVSSv2
CVE-2004-0421
The Portable Network Graphics library (libpng) 1.0.15 and previous versions allows malicious users to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Openpkg Openpkg 2.0
Libpng Libpng 1.2.2
Libpng Libpng 1.0.8
Libpng Libpng 1.2.4
Libpng Libpng 1.0.14
Libpng Libpng 1.2.0
Openpkg Openpkg 1.3
Libpng Libpng 1.0.11
Libpng Libpng 1.0.9
Libpng Libpng 1.0.13
Libpng Libpng 1.0.6
Libpng Libpng 1.0.7
Libpng Libpng 1.2.3
Libpng Libpng 1.0.5
Libpng Libpng 1.2.1
Redhat Libpng 1.2.2-16
Libpng Libpng 1.0.12
Libpng Libpng 1.2.5
Libpng Libpng 1.0.0
Redhat Libpng 1.2.2-20
Libpng Libpng 1.0.10
Trustix Secure Linux 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »