Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 5.1
Redhat Linux 6.0
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 4.4
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 5.2
NA
CVE-2000-0196
Buffer overflow in mhshow in the Linux nmh package allows remote malicious users to execute commands via malformed MIME headers in an email message.
Nmh Nmh 1.0.2
Redhat Linux 5.2
Redhat Linux 6.0
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Turbolinux Turbolinux 3.5b2
Turbolinux Turbolinux 4.4
NA
CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.1
Redhat Linux 6.0
Redhat Linux 6.2
Turbolinux Turbolinux 3.5b2
Turbolinux Turbolinux 4.2
Redhat Linux 5.0
Redhat Linux 5.2
Turbolinux Turbolinux 4.4
3 EDB exploits
NA
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
NA
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
1 EDB exploit
NA
CVE-2000-0052
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.0
Redhat Linux 6.1
Turbolinux Turbolinux 3.5b2
Turbolinux Turbolinux 4.4
2 EDB exploits
NA
CVE-1999-1330
The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow malicious users to exploit buffer overflows that would be prevented by a properly implemented snprintf.
Debian Debian Linux 4.0
Redhat Linux 4.2
NA
CVE-1999-1331
netcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface.
Redhat Linux 4.2
NA
CVE-1999-0704
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Bsdi Bsd Os 4.0.1
Freebsd Freebsd 3.1
Bsdi Bsd Os 3.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Redhat Linux 6.0
2 EDB exploits
NA
CVE-1999-0768
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.
Redhat Linux 4.2
Redhat Linux 5.2
Redhat Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 6.0
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »