Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
turbolinux turbolinux 6.0.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0196
Buffer overflow in mhshow in the Linux nmh package allows remote malicious users to execute commands via malformed MIME headers in an email message.
Nmh Nmh 1.0.2
Redhat Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Turbolinux Turbolinux 3.5b2
NA
CVE-2000-0172
The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.
Matt Kimball And Roger Wolff Mtr 0.28
Matt Kimball And Roger Wolff Mtr 0.41
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Turbolinux Turbolinux 3.5b2
1 EDB exploit
NA
CVE-2000-0052
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Mandrakesoft Mandrake Linux 6.0
Redhat Linux 6.1
Turbolinux Turbolinux 3.5b2
Mandrakesoft Mandrake Linux 6.1
2 EDB exploits
NA
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Redhat Linux 5.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-0336
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
Openldap Openldap 1.2.7
Openldap Openldap 1.2.10
Openldap Openldap 1.2.8
Openldap Openldap 1.2.9
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
NA
CVE-2000-0438
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
Suse Suse Linux 6.2
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.4
Caldera Openlinux 7.0
Slackware Slackware Linux 3.9
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Turbolinux Turbolinux 6.0.1
Turbolinux Turbolinux 6.0
Turbolinux Turbolinux 6.0.2
Suse Suse Linux 6.1
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Suse Suse Linux 7.0
Slackware Slackware Linux 3.6
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Slackware Slackware Linux 3.3
3 EDB exploits
NA
CVE-2004-0817
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote malicious users to execute arbitrary code via a crafted BMP file.
Enlightenment Imlib 1.9.8
Enlightenment Imlib2 1.1.1
Enlightenment Imlib 1.9.3
Enlightenment Imlib2 1.0
Imagemagick Imagemagick 5.4.3
Conectiva Linux 9.0
Imagemagick Imagemagick 6.0.2
Enlightenment Imlib 1.9.13
Imagemagick Imagemagick 5.4.8
Enlightenment Imlib 1.9.7
Enlightenment Imlib 1.9.1
Enlightenment Imlib2 1.0.5
Imagemagick Imagemagick 5.4.8.2.1.1.0
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Imagemagick Imagemagick 5.5.3.2.1.2.0
Imagemagick Imagemagick 5.4.7
Enlightenment Imlib 1.9.2
Sun Java Desktop System 2003
Enlightenment Imlib2 1.0.2
Imagemagick Imagemagick 5.4.4.5
Enlightenment Imlib 1.9.11
NA
CVE-2004-0827
Multiple buffer overflows in the ImageMagick graphics library 5.x prior to 5.4.4, and 6.x prior to 6.0.6.2, allow remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
Enlightenment Imlib 1.9.8
Enlightenment Imlib2 1.1.1
Enlightenment Imlib 1.9.3
Enlightenment Imlib2 1.0
Imagemagick Imagemagick 5.4.3
Conectiva Linux 9.0
Imagemagick Imagemagick 6.0.2
Enlightenment Imlib 1.9.13
Imagemagick Imagemagick 5.4.8
Enlightenment Imlib 1.9.7
Enlightenment Imlib 1.9.1
Enlightenment Imlib2 1.0.5
Imagemagick Imagemagick 5.4.8.2.1.1.0
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Imagemagick Imagemagick 5.5.3.2.1.2.0
Imagemagick Imagemagick 5.4.7
Enlightenment Imlib 1.9.2
Sun Java Desktop System 2003
Enlightenment Imlib2 1.0.2
Imagemagick Imagemagick 5.4.4.5
Enlightenment Imlib 1.9.11
NA
CVE-2004-0802
Buffer overflow in the BMP loader in imlib2 prior to 1.1.2 allows remote malicious users to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Enlightenment Imlib 1.9.8
Enlightenment Imlib2 1.1.1
Enlightenment Imlib 1.9.3
Enlightenment Imlib2 1.0
Imagemagick Imagemagick 5.4.3
Conectiva Linux 9.0
Imagemagick Imagemagick 6.0.2
Enlightenment Imlib 1.9.13
Imagemagick Imagemagick 5.4.8
Enlightenment Imlib 1.9.7
Enlightenment Imlib 1.9.1
Enlightenment Imlib2 1.0.5
Imagemagick Imagemagick 5.4.8.2.1.1.0
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Imagemagick Imagemagick 5.5.3.2.1.2.0
Imagemagick Imagemagick 5.4.7
Enlightenment Imlib 1.9.2
Sun Java Desktop System 2003
Enlightenment Imlib2 1.0.2
Imagemagick Imagemagick 5.4.4.5
Enlightenment Imlib 1.9.11
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started