Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.1 vulnerabilities and exploits
(subscribe to this query)
107
VMScore
CVE-2001-0119
getty_ps 2.0.7j allows local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
107
VMScore
CVE-2001-0120
useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Mandrakesoft Mandrake Linux 7.0
107
VMScore
CVE-2001-0138
privatepw program in wu-ftpd prior to 2.6.1-6 allows local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
107
VMScore
CVE-2001-0139
inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Caldera Openlinux Desktop 2.3
Immunix Immunix 7.0 Beta
Caldera Openlinux Edesktop 2.4
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Caldera Openlinux Eserver 2.3
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
107
VMScore
CVE-2001-0140
arpwatch 2.1a4 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
107
VMScore
CVE-2001-0142
squid 2.3 and previous versions allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Immunix Immunix 7.0 Beta
National Science Foundation Squid Web Proxy 2.3 Stable4
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Trustix Secure Linux 1.1
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
NA
CVE-2023-4641
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve ...
Shadow-maint Shadow-utils
Redhat Enterprise Linux 8.0
Redhat Codeready Linux Builder 8.0
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux For Arm 64 9.0
Redhat Enterprise Linux For Arm 64 8.0
Redhat Codeready Linux Builder For Ibm Z Systems 9.0 S390x
Redhat Codeready Linux Builder For Arm64 9.0 Aarch64
Redhat Enterprise Linux For Power Little Endian 8.0 Ppc64le
Redhat Enterprise Linux For Ibm Z Systems 8.0 S390x
Redhat Codeready Linux Builder For Power Little Endian 9.0 Ppc64le
Redhat Codeready Linux Builder 9.0
Redhat Enterprise Linux For Power Little Endian 9.0 Ppc64le
Redhat Enterprise Linux For Ibm Z Systems 9.0 S390x
Redhat Codeready Linux Builder For Ibm Z Systems 8.0 S390x
Redhat Codeready Linux Builder For Arm64 8.0 Aarch64
Redhat Codeready Linux Builder For Power Little Endian 8.0 Ppc64le
NA
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
35 Github repositories
2 Articles
NA
CVE-2022-3707
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.
Linux Linux Kernel
Linux Linux Kernel 6.1
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
NA
CVE-2019-8720
A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.
Webkitgtk Webkitgtk
Wpewebkit Wpe Webkit
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux For Ibm Z Systems 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.4
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Ibm Z Systems Eus 8.4
Redhat Enterprise Linux For Ibm Z Systems 8.0
Redhat Enterprise Linux For Power Little Endian Eus 8.4
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.4
Redhat Codeready Linux Builder 8.0
Redhat Codeready Linux Builder Eus 8.4
Redhat Codeready Linux Builder For Power Little Endian Eus 8.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10