Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
immunix immunix 7.0 vulnerabilities and exploits
(subscribe to this query)
107
VMScore
CVE-2001-0119
getty_ps 2.0.7j allows local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
107
VMScore
CVE-2001-0120
useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
107
VMScore
CVE-2001-0140
arpwatch 2.1a4 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
107
VMScore
CVE-2001-0142
squid 2.3 and previous versions allows local users to overwrite arbitrary files via a symlink attack in some configurations.
National Science Foundation Squid Web Proxy 2.3 Stable4
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 6.1
107
VMScore
CVE-2001-0143
vpop3d program in linuxconf 1.23r and previous versions allows local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Redhat Linux 7.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3