Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.1 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2005-0754
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote malicious users to execute arbitrary code.
Kde Quanta 3.1
Conectiva Linux 10.0
Conectiva Linux 9.0
Kde Kde 3.2.1
Kde Kde 3.2.2
Ubuntu Ubuntu Linux 4.1
Ubuntu Ubuntu Linux 5.04
Kde Kde 3.2.3
Kde Kde 3.3
Gentoo Linux
Kde Kde 3.2
Redhat Fedora Core Core 3.0
Kde Kde 3.3.1
Kde Kde 3.3.2
Kde Kde 3.4
668
VMScore
CVE-2004-0817
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote malicious users to execute arbitrary code via a crafted BMP file.
Enlightenment Imlib 1.9
Enlightenment Imlib 1.9.2
Enlightenment Imlib 1.9.3
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.0.1
Imagemagick Imagemagick 5.4.3
Imagemagick Imagemagick 5.4.4.5
Imagemagick Imagemagick 6.0.2
Sun Java Desktop System 2.0
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 5.4.8
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.12
Enlightenment Imlib 1.9.6
668
VMScore
CVE-2004-0642
Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and previous versions may allow remote malicious users to execute arbitrary code.
Mit Kerberos 5
Debian Debian Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
668
VMScore
CVE-2004-0827
Multiple buffer overflows in the ImageMagick graphics library 5.x prior to 5.4.4, and 6.x prior to 6.0.6.2, allow remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.12
Enlightenment Imlib 1.9.6
Enlightenment Imlib 1.9.7
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
Enlightenment Imlib2 1.1
Imagemagick Imagemagick 5.4.8.2.1.1.0
Imagemagick Imagemagick 5.5.3.2.1.2.0
Conectiva Linux 9.0
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 5.4.8
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.13
Enlightenment Imlib 1.9.14
668
VMScore
CVE-2001-0439
licq prior to 1.0.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in a URL.
Conectiva Linux 5.0
Licq Licq
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 4.0
Conectiva Linux 4.0es
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Freebsd Freebsd 4.2
Mandrakesoft Mandrake Linux 7.1
Freebsd Freebsd 3.5.1
668
VMScore
CVE-1999-0706
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Isc Inn 1.7.2
Isc Inn 2.1
Isc Inn 1.5.1
Isc Inn 1.7
Isc Inn 2.0
Isc Inn 2.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
641
VMScore
CVE-2012-3515
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space.&q...
Xen Xen 4.0.0
Xen Xen 4.1.0
Qemu Qemu
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 10
Suse Linux Enterprise Desktop 11
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Suse Linux Enterprise Desktop 10
Opensuse Opensuse 12.1
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Software Development Kit 10
Redhat Virtualization 3.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.3
Redhat Virtualization 6.0
Redhat Virtualization 5.0
641
VMScore
CVE-2002-0062
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Suse Suse Linux 6.2
Redhat Linux 7.2
Debian Debian Linux 2.2
Freebsd Freebsd 3.1
Redhat Linux 6.1
Redhat Linux 7.1
Freebsd Freebsd 3.5.1
Redhat Linux 7.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Gnu Ncurses
641
VMScore
CVE-2000-0963
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Freebsd Freebsd 4.1.1
Redhat Linux 7.0
Redhat Linux 6.2
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Gnu Ncurses
641
VMScore
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Caldera Openlinux 2.2
Debian Debian Linux 2.2
Redhat Linux 5.1
Redhat Linux 6.0
Debian Debian Linux 2.1
Redhat Linux 5.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »