Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.2 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-1999-0234
Bash treats any character with a value of 255 as a command separator.
Yggdrasil Linux
Sgi Irix
Caldera Openlinux
Redhat Linux 3.0.3
Suse Suse Linux 4.2
393
VMScore
CVE-2019-19921
runc up to and including 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom image...
Linuxfoundation Runc 1.0.0
Linuxfoundation Runc
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Redhat Openshift Container Platform 4.1
Redhat Openshift Container Platform 4.2
383
VMScore
CVE-2020-1760
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
Linuxfoundation Ceph
Redhat Ceph Storage 3.0
Redhat Openshift Container Platform 4.2
Redhat Ceph Storage 4.0
Fedoraproject Fedora 31
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
356
VMScore
CVE-2020-35513
A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new N...
Linux Linux Kernel 4.2
Redhat Enterprise Linux 7.0
356
VMScore
CVE-2019-2996
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u221; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple...
Oracle Jdk 1.8.0
Oracle Jre 1.8.0
Netapp Snapmanager -
Netapp Oncommand Workflow Automation -
Netapp E-series Santricity Web Services Proxy -
Netapp E-series Santricity Storage Manager -
Netapp E-series Santricity Unified Manager -
Netapp E-series Santricity Os Controller
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Satellite 5.8
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.6
329
VMScore
CVE-2005-0988
Race condition in gzip 1.2.4, 1.3.3, and previous versions, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompressio...
Gnu Gzip 1.3.3
Gnu Gzip 1.2.4
Gnu Gzip 1.2.4a
Freebsd Freebsd 4.3
Redhat Enterprise Linux 2.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Redhat Enterprise Linux 4.0
Trustix Secure Linux 2.0
Redhat Enterprise Linux Desktop 3.0
Freebsd Freebsd 5.1
Ubuntu Ubuntu Linux 4.1
Redhat Linux Advanced Workstation 2.1
Freebsd Freebsd 4.4
Redhat Enterprise Linux 3.0
Freebsd Freebsd 4.8
Turbolinux Turbolinux Appliance Server 1.0 Workgroup
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
220
VMScore
CVE-2001-0170
glibc 2.1.9x and previous versions does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
Conectiva Linux Graficas
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 6.0
Conectiva Linux 5.1
Immunix Immunix 7.0 Beta
Conectiva Linux Ecommerce
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Debian Debian Linux 2.3
Redhat Linux 7.0
2 EDB exploits
215
VMScore
CVE-2000-0336
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
Openldap Openldap 1.2.7
Openldap Openldap 1.2.10
Openldap Openldap 1.2.8
Openldap Openldap 1.2.9
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
210
VMScore
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
1 EDB exploit
49 Github repositories
9 Articles
205
VMScore
CVE-2019-2797
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communicatio...
Oracle Mysql
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Redhat Software Collections 1.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »