Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
7.2
CVSSv2
CVE-1999-1186
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Rxvt Rxvt
Slackware Slackware Linux 3.0
Redhat Linux 2.1
7.1
CVSSv2
CVE-2006-4997
The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote malicious users to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference...
Linux Linux Kernel
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4
Redhat Enterprise Linux 3
5
CVSSv2
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Linux Linux Kernel 2.2.10
Redhat Linux 6.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 6.0
Linux Linux Kernel 2.2.12
Redhat Linux 6.2
Linux Linux Kernel 2.2.14
7.5
CVSSv2
CVE-1999-0706
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Isc Inn 1.5.1
Isc Inn 2.2
Isc Inn 1.7.2
Isc Inn 2.0
Isc Inn 1.7
Isc Inn 2.1
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.2
5
CVSSv2
CVE-2000-0508
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote malicious users to cause a denial of service via a malformed request.
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 6.0
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
2.1
CVSSv2
CVE-2004-0977
The make_oidjoins_check script in PostgreSQL 7.4.5 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Postgresql Postgresql
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
7.5
CVSSv2
CVE-2014-0175
mcollective has a default password set at install
Puppet Marionette Collective -
Redhat Openshift 2.1
Redhat Openshift 1.0
Debian Debian Linux 8.0
Debian Debian Linux 10.0
2.1
CVSSv2
CVE-1999-1496
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
Todd Miller Sudo 1.5
Debian Debian Linux 2.1
Redhat Linux 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »