Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat enterprise linux 2.1 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2005-1061
The secure script in LogWatch prior to 2.6-2 allows malicious users to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processin...
Logwatch Logwatch 2.6.2
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
1 EDB exploit
505
VMScore
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
483
VMScore
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.3
Opensuse Leap 42.2
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
W1.fi Hostapd 2.3
W1.fi Hostapd 2.2
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.4.8
W1.fi Hostapd 0.2.6
1 Article
454
VMScore
CVE-2005-0667
Buffer overflow in Sylpheed prior to 1.0.3 and other versions prior to 1.9.5 allows remote malicious users to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
Sylpheed Sylpheed 0.9.6
Sylpheed Sylpheed 0.9.7
Sylpheed Sylpheed 0.9.8
Sylpheed Sylpheed 0.9.9
Sylpheed Sylpheed 0.9.10
Sylpheed Sylpheed 0.9.12
Sylpheed Sylpheed 0.9.5
Sylpheed Sylpheed 0.9.99
Sylpheed Sylpheed 1.0.1
Sylpheed-claws Sylpheed-claws 1.0.2
Sylpheed Sylpheed 0.8.11
Sylpheed Sylpheed 0.9.11
Sylpheed Sylpheed 0.9.4
Sylpheed Sylpheed 1.0.0
Sylpheed Sylpheed 1.0.2
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 3.0
Redhat Linux Advanced Workstation 2.1
Altlinux Alt Linux 2.3
Gentoo Linux
454
VMScore
CVE-2004-0802
Buffer overflow in the BMP loader in imlib2 prior to 1.1.2 allows remote malicious users to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.6
Enlightenment Imlib 1.9.7
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
Imagemagick Imagemagick 5.4.8
Imagemagick Imagemagick 5.4.8.2.1.1.0
Imagemagick Imagemagick 5.5.3.2.1.2.0
Conectiva Linux 9.0
Enlightenment Imlib 1.9
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.4.5
Imagemagick Imagemagick 5.4.7
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.2
Enlightenment Imlib 1.9.3
446
VMScore
CVE-2019-0820
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.
Microsoft .net Core 1.0
Microsoft .net Core 1.1
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
Microsoft .net Framework 4.8
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
4 Github repositories
1 Article
445
VMScore
CVE-2020-0602
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
Microsoft Asp.net Core 2.1
Microsoft Asp.net Core 3.0
Microsoft Asp.net Core 3.1
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
1 Article
445
VMScore
CVE-2015-3900
RubyGems 2.0.x prior to 2.0.16, 2.2.x prior to 2.2.4, and 2.4.x prior to 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote malicious users to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hij...
Ruby-lang Ruby 2.1.1
Ruby-lang Ruby 2.1.2
Ruby-lang Ruby 1.9.3
Ruby-lang Ruby 2.0.0
Ruby-lang Ruby 2.1
Ruby-lang Ruby 1.9.1
Ruby-lang Ruby 1.9.2
Ruby-lang Ruby 2.1.5
Ruby-lang Ruby 2.2.0
Ruby-lang Ruby 1.9
Ruby-lang Ruby 2.1.3
Ruby-lang Ruby 2.1.4
Rubygems Rubygems 2.0.1
Rubygems Rubygems 2.0.2
Rubygems Rubygems 2.0.3
Rubygems Rubygems 2.0.10
Rubygems Rubygems 2.0.11
Rubygems Rubygems 2.2.2
Rubygems Rubygems 2.2.3
Rubygems Rubygems 2.0.4
Rubygems Rubygems 2.0.5
Rubygems Rubygems 2.0.12
1 Github repository
1 Article
445
VMScore
CVE-2005-3626
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows malicious users to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
Easy Software Products Cups 1.1.22 Rc1
Easy Software Products Cups 1.1.23
Kde Kpdf 3.2
Kde Kpdf 3.4.3
Tetex Tetex 3.0
Xpdf Xpdf 3.0
Easy Software Products Cups 1.1.23 Rc1
Kde Kdegraphics 3.2
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Conectiva Linux 10.0
Libextractor Libextractor
Kde Kdegraphics 3.4.3
Kde Koffice 1.4
Sgi Propack 3.0
Tetex Tetex 1.0.7
Easy Software Products Cups 1.1.22
Kde Koffice 1.4.1
Kde Koffice 1.4.2
Tetex Tetex 2.0
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
445
VMScore
CVE-2005-3624
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows malicious users to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integ...
Kde Kdegraphics 3.2
Kde Kdegraphics 3.4.3
Sgi Propack 3.0
Tetex Tetex 1.0.7
Libextractor Libextractor
Easy Software Products Cups 1.1.23
Easy Software Products Cups 1.1.23 Rc1
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Xpdf Xpdf 3.0
Conectiva Linux 10.0
Easy Software Products Cups 1.1.22
Easy Software Products Cups 1.1.22 Rc1
Kde Koffice 1.4.2
Kde Kpdf 3.2
Kde Kpdf 3.4.3
Tetex Tetex 2.0.2
Tetex Tetex 3.0
Kde Koffice 1.4
Kde Koffice 1.4.1
Tetex Tetex 2.0
Tetex Tetex 2.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »