Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file prior to 4.12 allows malicious users to execute arbitrary code via a crafted ELF file.
File File 4.7
File File 4.5
File File 4.4
File File 4.1
File File 4.10
File File 4.2
File File 4.9
File File 4.6
File File 4.3
File File 4.8
File File 4.0
File File 4.11
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Gentoo Linux
1 EDB exploit
NA
CVE-2004-2546
Multiple memory leaks in Samba prior to 3.0.6 allow malicious users to cause a denial of service (memory consumption).
Samba Samba 2.2.1a
Samba Samba 3.0.3
Samba Samba 2.2.12
Samba Samba 2.2.3a
Samba Samba 1.9.18
Samba Samba 3.0.2a
Samba Samba 3.0.5
Samba Samba 1.9.17
Samba Samba 2.2.8a
Samba Samba 3.0.4
Samba Samba 2.2.9
Samba Samba 3.0.0
Samba Samba 2.2.11
Samba Samba 2.2.1
Samba Samba 2.2.7a
Samba Samba 2.0
Samba Samba 2.2a
Samba Samba 3.0.2
Samba Samba 2.0.5a
Samba Samba 2.2.10
Samba Samba 2.0.0
Samba Samba 3.0.1
NA
CVE-2004-0803
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and previous versions, related to buffer overflows and integer overflows, allow remote malicious users to execute arbitrary code via TIFF files.
Libtiff Libtiff 3.6.1
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.1
Suse Suse Linux 9.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Apple Mac Os X Server 10.3.2
Apple Mac Os X 10.2.5
Trustix Secure Linux 2.0
Apple Mac Os X Server 10.2.2
Redhat Enterprise Linux Desktop 3.0
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
Apple Mac Os X Server 10.2.4
NA
CVE-2004-0685
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.5.40
Linux Linux Kernel 2.5.21
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Linux Linux Kernel 2.5.0
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.5.13
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.5.47
NA
CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Conectiva Linux 10
Mandrakesoft Mandrake Multi Network Firewall 8.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Mandrakesoft Mandrake Linux 9.2
Suse Suse Linux 8.0
Linux Linux Kernel 2.0
Trustix Secure Linux 2
Suse Suse Linux 9.1
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Suse Suse Linux 8.1
1 EDB exploit
NA
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Trustix Secure Linux 2
Linux Linux Kernel 2.4.0
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
NA
CVE-2004-0415
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.6.2
Redhat Fedora Core Core 1.0
1 EDB exploit
NA
CVE-2004-0801
Unknown vulnerability in foomatic-rip in Foomatic prior to 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
Conectiva Linux 9.0
Linuxprinting.org Foomatic-filters 3.1
Linuxprinting.org Foomatic-filters 3.0.1
Sun Java Desktop System 2003
Sun Java Desktop System 2.0
Linuxprinting.org Foomatic-filters 3.0
Linuxprinting.org Foomatic-filters 3.0.2
Conectiva Linux 10.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
NA
CVE-2004-0809
The mod_dav module in Apache 2.0.50 and previous versions allows remote malicious users to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
Apache Http Server
Hp Secure Web Server For Tru64 5.1
Hp Hp-ux 11.11
Trustix Secure Linux 2.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Mandrakesoft Mandrake Linux 9.2
Hp Secure Web Server For Tru64 5.0 A
Hp Secure Web Server For Tru64 6.3.0
Hp Hp-ux 11.00
Hp Hp-ux 11.23
Hp Hp-ux 11.22
Hp Secure Web Server For Tru64 5.8.1
Turbolinux Turbolinux Home
Hp Secure Web Server For Tru64 4.0 F
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Hp Secure Web Server For Tru64 5.1 A
Hp Secure Web Server For Tru64 5.9.1
Hp Secure Web Server For Tru64 5.9.2
Hp Secure Web Server For Tru64 4.0 G
NA
CVE-2004-0432
ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
Proftpd Project Proftpd 1.2.9
Trustix Secure Linux 2.0
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 1.1a
Gentoo Linux 0.7
Gentoo Linux 1.2
Trustix Secure Linux 2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »