Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Caldera Openlinux 2.2
Debian Debian Linux 2.2
Redhat Linux 5.1
Redhat Linux 6.0
Debian Debian Linux 2.1
Redhat Linux 5.2
NA
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 4.0
Redhat Linux 4.2
Caldera Openlinux 2.2
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Redhat Linux 4.1
Redhat Linux 5.0
1 EDB exploit
NA
CVE-1999-1186
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Rxvt Rxvt
Redhat Linux 2.1
Slackware Slackware Linux 3.0
7.5
CVSSv3
CVE-2006-4997
The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote malicious users to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference...
Linux Linux Kernel
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4
Redhat Enterprise Linux 3
NA
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Redhat Linux 6.0
Redhat Linux 6.1
Debian Debian Linux 2.2
Linux Linux Kernel 2.2.12
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.14
Redhat Linux 6.2
NA
CVE-1999-0706
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Isc Inn 1.7.2
Isc Inn 2.1
Isc Inn 1.5.1
Isc Inn 1.7
Isc Inn 2.0
Isc Inn 2.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
NA
CVE-2000-0508
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote malicious users to cause a denial of service via a malformed request.
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Debian Debian Linux 2.1
Debian Debian Linux 2.2
1 EDB exploit
NA
CVE-2007-1351
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont prior to 20070403 and (2) freetype 2.3.2 and previous versions allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.10
X.org Libxfont 1.2.2
Xfree86 Project X11r6 4.3.0
Xfree86 Project X11r6 4.3.0.1
Xfree86 Project X11r6 4.3.0.2
Rpath Rpath Linux 1
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux 5.0
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
Mandrakesoft Mandrake Multi Network Firewall 2.0
NA
CVE-2004-0977
The make_oidjoins_check script in PostgreSQL 7.4.5 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Postgresql Postgresql
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
NA
CVE-1999-1496
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
Todd Miller Sudo 1.5
Debian Debian Linux 2.1
Redhat Linux 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »