Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-1299
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.
Slackware Slackware Linux 3.1
Redhat Linux 4.0
NA
CVE-1999-1330
The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow malicious users to exploit buffer overflows that would be prevented by a properly implemented snprintf.
Debian Debian Linux 4.0
Redhat Linux 4.2
NA
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
7
CVSSv3
CVE-2023-27561
runc up to and including 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. N...
Linuxfoundation Runc
Redhat Enterprise Linux 8.0
Redhat Openshift Container Platform 4.0
Redhat Enterprise Linux 9.0
Debian Debian Linux 10.0
NA
CVE-2008-1767
Buffer overflow in pattern.c in libxslt prior to 1.1.24 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large ...
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop Workstation 5
Redhat Desktop 3
Redhat Enterprise Linux Desktop 5
Redhat Enterprise Linux 4.0
1 EDB exploit
7.5
CVSSv3
CVE-2022-0711
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an malicious user to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The hig...
Haproxy Haproxy
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Software Collections -
Redhat Openshift Container Platform 4.0
Debian Debian Linux 11.0
NA
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
1 EDB exploit
NA
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
5.9
CVSSv3
CVE-2020-25657
A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
M2crypto Project M2crypto
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Virtualization 4.0
Fedoraproject Fedora 33
1 Article
7.8
CVSSv3
CVE-2018-5848
In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Androi...
Google Android -
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Virtualization Host 4.0
Debian Debian Linux 8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »