Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 1.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0971
The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 up to and including 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Mit Kerberos 5 1.3.4
NA
CVE-2004-0972
The lvmcreate_initrd script in the lvm package in Trustix Secure Linux 1.5 up to and including 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Lvm Logical Volume Management Utilities 1.0.1
Lvm Logical Volume Management Utilities 1.0.4
Lvm Logical Volume Management Utilities 1.0.7
Lvm Logical Volume Management Utilities 1.0.8
Gentoo Linux
NA
CVE-2004-0975
The der_chop script in the openssl package in Trustix Secure Linux 1.5 up to and including 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Openssl Openssl 0.9.6f
Openssl Openssl 0.9.6g
Openssl Openssl 0.9.6h
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.6b
Openssl Openssl 0.9.6c
Openssl Openssl 0.9.6k
Openssl Openssl 0.9.6l
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.6i
Openssl Openssl 0.9.6j
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.6e
Openssl Openssl 0.9.6m
Openssl Openssl 0.9.7c
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 10.1
Gentoo Linux
NA
CVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Larry Wall Perl 5.8.0
Sgi Propack 3.0
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Suse Suse Linux 9.0
Ubuntu Ubuntu Linux 4.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Ibm Aix 5.3
Suse Suse Linux 8.0
Ibm Aix 5.2
Trustix Secure Linux 1.5
1 EDB exploit
NA
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.4
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 3.0
NA
CVE-2004-0918
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache prior to 2.4.STABLE7 allows remote malicious users to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Squid Squid 2.4 .stable2
Squid Squid 2.4 .stable6
Squid Squid 3.0 Pre2
Squid Squid 3.0 Pre3
Openpkg Openpkg Current
Squid Squid 2.0 Patch2
Squid Squid 2.4 .stable7
Squid Squid 2.5 .stable1
Squid Squid 2.5 .stable3
Squid Squid 2.3 .stable5
Squid Squid 2.4
Squid Squid 2.5 .stable6
Squid Squid 3.0 Pre1
Squid Squid 2.1 Patch2
Squid Squid 2.3 .stable4
Squid Squid 2.5 .stable4
Squid Squid 2.5 .stable5
Ubuntu Ubuntu Linux 4.1
Gentoo Linux
Trustix Secure Linux 2.0
NA
CVE-2004-0949
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to ...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Redhat Fedora Core Core 3.0
Suse Suse Linux 9.0
Trustix Secure Linux 2.2
Ubuntu Ubuntu Linux 4.1
NA
CVE-2004-1073
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
1 EDB exploit
NA
CVE-2004-1070
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Redhat Fedora Core Core 3.0
NA
CVE-2004-1071
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 3.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Linux Linux Kernel 2.4.15
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »