Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux 2.1 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2019-8383
An issue exists in AdvanceCOMP up to and including 2.1. An invalid memory address occurs in the function adv_png_unfilter_8 in lib/png.c. It can be triggered by sending a crafted file to a binary. It allows an malicious user to cause a Denial of Service (Segmentation fault) or po...
Advancemame Advancecomp
Debian Debian Linux 9.0
Fedoraproject Fedora 30
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
5
CVSSv2
CVE-2004-1613
Mozilla allows remote malicious users to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstr...
Mozilla Mozilla 1.0
Mozilla Mozilla 1.1
Mozilla Mozilla 1.3
Mozilla Mozilla 1.3.1
Mozilla Mozilla 1.5
Mozilla Mozilla 1.6
Mozilla Mozilla 1.4
Mozilla Mozilla 1.4.1
Mozilla Mozilla 1.7
Mozilla Mozilla 1.7.1
Mozilla Mozilla 1.0.1
Mozilla Mozilla 1.0.2
Mozilla Mozilla 1.2
Mozilla Mozilla 1.8
Sgi Propack 3.0
Mozilla Mozilla 1.2.1
Mozilla Mozilla 1.4.2
Mozilla Mozilla 1.4.4
Mozilla Mozilla 1.7.2
Mozilla Mozilla 1.7.3
Redhat Enterprise Linux 2.1
Redhat Linux 7.3
7.7
CVSSv2
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and previous versions and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_...
Qemu Qemu
Redhat Openstack 4.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Openstack 5.0
Redhat Openstack 7.0
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Linux 5
Xen Xen 4.5.0
Redhat Openstack 6.0
1 EDB exploit
5 Github repositories
3 Articles
5
CVSSv2
CVE-2003-0549
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) via a short authorization key name.
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Redhat Kdebase 2.2.3.1.22
Redhat Kdebase 2.4.0.7.13
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Redhat Kdebase 2.2.3.1.20
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
5
CVSSv2
CVE-2003-0548
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Redhat Kdebase 2.2.3.1.20
Redhat Kdebase 2.2.3.1.22
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Redhat Kdebase 2.4.0.7.13
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
2.1
CVSSv2
CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Conectiva Linux 10
Redhat Enterprise Linux 2.1
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Redhat Enterprise Linux 3.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Gentoo Linux
Linux Linux Kernel 2.0
Suse Suse Linux 9.1
Trustix Secure Linux 2
1 EDB exploit
5
CVSSv2
CVE-2005-0384
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote malicious users to cause a denial of service (kernel crash) via a pppd client.
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Redhat Enterprise Linux 2.1
Trustix Secure Linux 2
Trustix Secure Linux 2.1
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Trustix Secure Linux 2.2
Ubuntu Ubuntu Linux 4.10
4.3
CVSSv2
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
5
CVSSv2
CVE-2004-0421
The Portable Network Graphics library (libpng) 1.0.15 and previous versions allows malicious users to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Openpkg Openpkg 2.0
Libpng Libpng 1.2.2
Libpng Libpng 1.0.8
Libpng Libpng 1.2.4
Libpng Libpng 1.0.14
Libpng Libpng 1.2.0
Openpkg Openpkg 1.3
Libpng Libpng 1.0.11
Libpng Libpng 1.0.9
Libpng Libpng 1.0.13
Libpng Libpng 1.0.6
Libpng Libpng 1.0.7
Libpng Libpng 1.2.3
Libpng Libpng 1.0.5
Libpng Libpng 1.2.1
Redhat Libpng 1.2.2-16
Libpng Libpng 1.0.12
Libpng Libpng 1.2.5
Libpng Libpng 1.0.0
Redhat Libpng 1.2.2-20
Libpng Libpng 1.0.10
Trustix Secure Linux 2.0
3.7
CVSSv2
CVE-2005-0988
Race condition in gzip 1.2.4, 1.3.3, and previous versions, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompressio...
Gnu Gzip 1.2.4
Gnu Gzip 1.2.4a
Gnu Gzip 1.3.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Turbolinux Turbolinux Appliance Server 1.0 Hosting
Turbolinux Turbolinux Appliance Server 1.0 Workgroup
Ubuntu Ubuntu Linux 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »