Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 1.1 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2000-0791
Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
Trustix Secure Linux 1.1
7.2
CVSSv2
CVE-2000-1009
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Trustix Secure Linux 1.1
Redhat Linux 6.2
2 EDB exploits
10
CVSSv2
CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote malicious users to execute arbitrary commands.
Caldera Openlinux Ebuilder 3.0
Trustix Secure Linux 1.1
Redhat Linux 7.0
Trustix Secure Linux 1.0
Caldera Openlinux
Caldera Openlinux Eserver 2.3
Caldera Openlinux Edesktop 2.4
4 EDB exploits
1.2
CVSSv2
CVE-2001-0117
sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 6.1
1.2
CVSSv2
CVE-2001-0142
squid 2.3 and previous versions allows local users to overwrite arbitrary files via a symlink attack in some configurations.
National Science Foundation Squid Web Proxy 2.3 Stable4
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 6.1
7.5
CVSSv2
CVE-2001-1030
Squid prior to 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows malicious users to bypass the ACLs and conduct unauthorized activities such as port scanning.
Squid Squid Web Proxy 2.3stable3
Immunix Immunix 7.0
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Squid Squid Web Proxy 2.3stable4
Mandrakesoft Mandrake Single Network Firewall 7.2
Caldera Openlinux Server 3.1
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 7.0
Trustix Secure Linux 1.01
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 8.0
2.1
CVSSv2
CVE-2001-0169
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Turbolinux Turbolinux
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Turbolinux Turbolinux 6.1
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
10
CVSSv2
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Suse Suse Linux 6.3
Debian Debian Linux 2.3
Debian Debian Linux 2.2
Trustix Secure Linux 1.1
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
Trustix Secure Linux 1.0
Suse Suse Linux 6.4
Suse Suse Linux 7.0
3 EDB exploits
10
CVSSv2
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
7.2
CVSSv2
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Debian Debian Linux 2.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Slackware Slackware Linux
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »