Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 5.2 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
7.5
CVSSv2
CVE-2001-0473
Format string vulnerability in Mutt prior to 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Conectiva Linux
Mutt Mutt
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
6.6
CVSSv2
CVE-2009-3939
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and previous versions has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Virtualization 5
Redhat Enterprise Linux Eus 5.4
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 5.0
Avaya Aura System Manager 6.0
Avaya Aura System Manager 5.2
Avaya Aura Communication Manager 5.2
Avaya Voice Portal 5.0
Avaya Aura System Platform 1.1
Avaya Aura Session Manager 1.1
Avaya Aura Session Manager 5.2
Avaya Aura Sip Enablement Services 5.2
Avaya Aura Application Enablement Services 5.2
Avaya Aura Application Enablement Services 5.2.1
7.5
CVSSv2
CVE-1999-0997
wu-ftp with FTP conversion enabled allows an malicious user to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Millenux Gmbh Anonftp 2.8.1
University Of Washington Wu-ftpd 2.5.0
University Of Washington Wu-ftpd 2.6.0
University Of Washington Wu-ftpd 2.4.2
Redhat Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.0
1 EDB exploit
4.6
CVSSv2
CVE-1999-0433
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Xfree86 Project X11r6 3.3.3
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Netbsd Netbsd 1.3.3
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Netbsd Netbsd 1.3.2
1 EDB exploit
5
CVSSv2
CVE-2008-2364
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a la...
Apache Http Server
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 9
Fedoraproject Fedora 8
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 4.7
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Redhat Enterprise Linux Eus 5.2
7.2
CVSSv2
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Slackware Slackware Linux
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
2.1
CVSSv2
CVE-2001-0736
Vulnerability in (1) pine prior to 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
University Of Washington Pine
Immunix Immunix 6.2
Immunix Immunix 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Engardelinux Secure Linux 1.0.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Redhat Linux 5.2
1 EDB exploit
4.6
CVSSv2
CVE-2001-0641
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Linux 5.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
1 EDB exploit
2.1
CVSSv2
CVE-2008-1945
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-20...
Qemu Qemu 0.9.0
Opensuse Opensuse 10.3
Opensuse Opensuse 11.0
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Debian Debian Linux 4.0
Debian Debian Linux 5.0
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.2
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »