Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
immunix immunix 7.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0738
LogLine function in klogd in sysklogd 1.3 in various Linux distributions allows an malicious user to cause a denial of service (hang) by causing null bytes to be placed in log messages.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Debian Debian Linux 1.3
Debian Debian Linux 2.2
NA
CVE-2001-0143
vpop3d program in linuxconf 1.23r and previous versions allows local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Redhat Linux 7.0
NA
CVE-2000-1095
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Conectiva Linux 5.1
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
1 EDB exploit
NA
CVE-2001-0416
sgml-tools (aka sgmltools) prior to 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools.
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Debian Sgml-tools 1.0.9.15
Immunix Immunix 6.2
Mandrakesoft Mandrake Linux 6.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 7.2
NA
CVE-2001-0641
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Linux 5.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
1 EDB exploit
NA
CVE-2001-0473
Format string vulnerability in Mutt prior to 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Conectiva Linux
Mutt Mutt
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
NA
CVE-2001-0736
Vulnerability in (1) pine prior to 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
University Of Washington Pine
Immunix Immunix 6.2
Immunix Immunix 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Engardelinux Secure Linux 1.0.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Redhat Linux 5.2
1 EDB exploit
NA
CVE-2000-1213
ping in iputils prior to 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
Immunix Immunix 6.2
Iputils Iputils
Redhat Linux 6.2
Redhat Linux 7.0
NA
CVE-2000-1214
Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils prior to 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
Immunix Immunix 6.2
Iputils Iputils
Redhat Linux 6.2
Redhat Linux 7.0
NA
CVE-2000-0963
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Freebsd Freebsd 4.1.1
Redhat Linux 7.0
Redhat Linux 6.2
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Gnu Ncurses
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »