Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 4.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0390
Buffer overflow in Dosemu Slang library in Linux.
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 5.0
Suse Suse Linux 5.0
Redhat Linux 4.1
Suse Suse Linux 5.1
Redhat Linux 4.0
Redhat Linux 4.2
10
CVSSv2
CVE-1999-0002
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Bsdi Bsd Os 1.1
Redhat Linux 2.0
Caldera Openlinux 1.2
Redhat Linux 5.1
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 2.1
Redhat Linux 4.2
1 EDB exploit
2 Github repositories
7.2
CVSSv2
CVE-1999-1095
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Redhat Linux 4.1
Slackware Slackware Linux 3.3
7.2
CVSSv2
CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
Redhat Linux 5.1
Redhat Linux 6.2
Redhat Linux 5.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Redhat Linux 5.2
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
Redhat Linux 6.0
Turbolinux Turbolinux 3.5b2
3 EDB exploits
7.2
CVSSv2
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
2.1
CVSSv2
CVE-2000-0633
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 6.2e
7.5
CVSSv2
CVE-1999-0706
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Isc Inn 1.5.1
Isc Inn 2.2
Isc Inn 1.7.2
Isc Inn 2.0
Isc Inn 1.7
Isc Inn 2.1
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.2
7.5
CVSSv2
CVE-2017-9214
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
Openvswitch Openvswitch 2.7.0
Debian Debian Linux 9.0
Redhat Openstack 7.0
Redhat Openstack 6.0
Redhat Virtualization Manager 4.1
Redhat Virtualization 4.1
Redhat Openstack 10
Redhat Openstack 9
Redhat Openstack 8
Redhat Openstack 11
Redhat Virtualization 4.0
10
CVSSv2
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »