Red Hat Enterprise Linux Server 2.0

CPE Details

Red Hat Enterprise Linux Server 2.0
2.0
2022-09-21
16h44 +00:00
2022-10-05
12h28 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

enterprise_linux_server

Version

2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2009-0846 2009-04-08 22h00 +00:00 The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
10
CVE-2008-3281 2008-08-27 18h00 +00:00 libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.
6.5
Medium
CVE-2007-1285 2007-03-06 19h00 +00:00 The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
7.5
High
CVE-2006-3918 2006-07-27 22h00 +00:00 http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
4.3
CVE-2004-0488 2004-05-28 02h00 +00:00 Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
7.5