Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat fedora core core 4.0 vulnerabilities and exploits
(subscribe to this query)
436
VMScore
CVE-2007-2030
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 5.0
Redhat Enterprise Linux 3.0
625
VMScore
CVE-2007-3103
The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow local users to change the permissions of arbitrary files via a symlink attack on the /tmp/.font-unix temporary file.
Fedoraproject Fedora Core 6.0
Redhat Linux
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux 4.0
1 EDB exploit
220
VMScore
CVE-2005-0736
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Conectiva Linux 10.0
Linux Linux Kernel 2.6.11
Redhat Fedora Core Core 2.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Redhat Enterprise Linux Desktop 4.0
Redhat Fedora Core Core 3.0
Linux Linux Kernel 2.6.6
2 EDB exploits
668
VMScore
CVE-2006-5170
pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and previous versions, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate fu...
Redhat Enterprise Linux 4.0
Fedoraproject Fedora Core
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux For Ibm Z Systems 4.0 S390x
Redhat Enterprise Linux For Ibm Z Systems 4.0 S390
Redhat Enterprise Linux For Power Big Endian 4.0
Debian Debian Linux 3.1
505
VMScore
CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.9.1
Lbl Tcpdump 3.8.2
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5 Alpha
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.4
Lbl Tcpdump 3.8.3
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.9
Lbl Tcpdump 3.8.1
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 10.2
Mandrakesoft Mandrake Linux 10.1
Redhat Fedora Core Core 4.0
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Redhat Fedora Core Core 3.0
1 EDB exploit
445
VMScore
CVE-2005-2970
Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote malicious users to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.
Apache Http Server
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
Canonical Ubuntu Linux 5.10
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Fedoraproject Fedora Core 4
338
VMScore
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
703
VMScore
CVE-2021-3752
A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from thi...
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux For Real Time 7
Redhat Enterprise Linux For Real Time For Nfv 7
Redhat Virtualization Host 4.0
Redhat Enterprise Linux 8.0
Redhat 3scale 2.0
Fedoraproject Fedora 34
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H300e Firmware -
Netapp H500e Firmware -
Netapp H700e Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Policy 22.2.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.1
740
VMScore
CVE-2005-0750
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 up to and including 2.4.30-rc1 and 2.6 up to and including 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Conectiva Linux 10.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.6.11
Redhat Fedora Core Core 2.0
Redhat Linux 7.3
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Suse Suse Linux 9.3
Linux Linux Kernel 2.6.1
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.3
Suse Suse Linux 1.0
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.6.2
4 EDB exploits
890
VMScore
CVE-2006-6235
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x prior to 1.4.6, 2.x prior to 2.0.2, and 1.9.0 up to and including 1.9.95 allows malicious users to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated...
Gnu Privacy Guard 2.0.1
Gnu Privacy Guard 1.4.2
Gnu Privacy Guard 1.4
Gnu Privacy Guard 1.4.5
Gnu Privacy Guard 1.4.1
Gpg4win Gpg4win 1.0.7
Gnu Privacy Guard 1.9.20
Gnu Privacy Guard 2.0
Gnu Privacy Guard 1.3.3
Gnu Privacy Guard 1.4.2.1
Gnu Privacy Guard 1.4.3
Gnu Privacy Guard 1.2.6
Gnu Privacy Guard 1.2.5
Gnu Privacy Guard 1.3.4
Gnu Privacy Guard 1.9.15
Gnu Privacy Guard 1.9.10
Gnu Privacy Guard 1.4.4
Gnu Privacy Guard 1.4.2.2
Gnu Privacy Guard 1.2.7
Gnu Privacy Guard 1.2.4
Ubuntu Ubuntu Linux 5.10
Redhat Enterprise Linux 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »