Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
conectiva linux 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0834
htsearch CGI program in htdig (ht://Dig) 3.1.5 and previous versions allows remote malicious users to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero,...
Conectiva Linux 6.0
Conectiva Linux 7.0
Conectiva Linux 5.0
Conectiva Linux 5.1
Htdig Htdig
Suse Suse Linux 7.2
Suse Suse Linux 7.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Debian Debian Linux 2.2
Suse Suse Linux 6.3
NA
CVE-2001-0128
Zope prior to 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 6.0
Zope Zope
Redhat Linux Powertools 6.1
Redhat Linux Powertools 6.2
Redhat Linux Powertools 7.0
Conectiva Linux 4.2
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
Debian Debian Linux 2.2
Freebsd Freebsd 6.2
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
NA
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.0
Conectiva Linux 4.0es
Immunix Immunix 6.2
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Caldera Openlinux Eserver 2.3
Hp Hp-ux 11.11
Redhat Linux 6.0
Redhat Linux 6.1
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.2e
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.0
2 EDB exploits
9.8
CVSSv3
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
NA
CVE-2005-1043
exif.c in PHP prior to 4.3.11 allows remote malicious users to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.2
Php Php 4.3.9
Sgi Propack 3.0
Php Php 4.3.0
Php Php 4.3.7
Php Php 4.3.8
Php Php 4.3.5
Php Php 4.3.6
Php Php 4.3.3
Php Php 4.3.4
Conectiva Linux 10.0
Conectiva Linux 9.0
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.4
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 6.1
Suse Suse Linux 6.4
Apple Mac Os X 10.4
NA
CVE-2001-1374
expect prior to 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.
Don Libes Expect 5.10
Don Libes Expect 5.11
Don Libes Expect 5.18
Don Libes Expect 5.19
Don Libes Expect 5.25
Don Libes Expect 5.0
Don Libes Expect 5.1
Don Libes Expect 5.16
Don Libes Expect 5.17
Don Libes Expect 5.23
Don Libes Expect 5.24
Don Libes Expect 5.31
Don Libes Expect 5.4
Conectiva Linux 7.0
Don Libes Expect 3
Don Libes Expect 4
Don Libes Expect 5.14
Don Libes Expect 5.15
Don Libes Expect 5.21
Don Libes Expect 5.22
Don Libes Expect 5.3
Don Libes Expect 5.30
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2