Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 6.4 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2001-0834
htsearch CGI program in htdig (ht://Dig) 3.1.5 and previous versions allows remote malicious users to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero,...
Conectiva Linux 6.0
Conectiva Linux 7.0
Conectiva Linux 5.0
Conectiva Linux 5.1
Htdig Htdig
Suse Suse Linux 7.2
Suse Suse Linux 7.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Debian Debian Linux 2.2
Suse Suse Linux 6.3
4.6
CVSSv2
CVE-2001-0641
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Linux 5.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
1 EDB exploit
10
CVSSv2
CVE-2001-0388
time server daemon timed allows remote malicious users to cause a denial of service via malformed packets.
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.1
Freebsd Freebsd
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Suse Suse Linux 6.1
7.5
CVSSv2
CVE-2001-0458
Multiple buffer overflows in ePerl prior to 2.2.14-0.7 allow local and remote malicious users to execute arbitrary commands.
Ralf S. Engelschall Eperl 2.2.12
Ralf S. Engelschall Eperl 2.2.13
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
7.2
CVSSv2
CVE-2000-1095
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Conectiva Linux 5.1
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
1 EDB exploit
5
CVSSv2
CVE-2004-1491
Opera 7.54 and previous versions uses kfmclient exec to handle unknown MIME types, which allows remote malicious users to execute arbitrary code via a shortcut or launcher that contains an Exec entry.
Opera Opera Browser
Gentoo Linux
Kde Kde 3.2.3
Suse Suse Linux 1.0
Suse Suse Linux 2.0
Suse Suse Linux 3.0
Suse Suse Linux 4.0
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 4.4.1
Suse Suse Linux 5.0
Suse Suse Linux 5.1
Suse Suse Linux 5.2
Suse Suse Linux 5.3
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
1 EDB exploit
2.1
CVSSv2
CVE-2001-0178
kdesu program in KDE2 (KDE prior to 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.
Conectiva Linux 6.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Suse Suse Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Mandrakesoft Mandrake Linux 7.0
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Suse Suse Linux 7.0
Caldera Openlinux Edesktop 2.4
Suse Suse Linux 6.1
Suse Suse Linux 6.2
5
CVSSv2
CVE-2001-0851
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote malicious users to bypass firewall rules by brute force guessing the cookie.
Caldera Openlinux Server 3.1
Caldera Openlinux Workstation 3.1
Caldera Openlinux Eserver 2.3.1
Linux Linux Kernel 2.0
Suse Suse Linux 7.2
Suse Suse Linux 7.3
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.4.0
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Caldera Openlinux 2.3
Caldera Openlinux Edesktop 2.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
7.2
CVSSv2
CVE-2000-0438
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.5
Suse Suse Linux 4.3
Suse Suse Linux 4.4.1
Suse Suse Linux 6.2
Suse Suse Linux 6.4
Suse Suse Linux 5.1
Suse Suse Linux 5.2
Suse Suse Linux 5.3
Suse Suse Linux 6.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Suse Suse Linux 4.2
Turbolinux Turbolinux 6.0
Turbolinux Turbolinux 6.0.1
Turbolinux Turbolinux 6.0.2
Caldera Openlinux 7.0
Slackware Slackware Linux 3.4
Suse Suse Linux 4.4
Suse Suse Linux 5.0
Suse Suse Linux 6.1
3 EDB exploits
7.5
CVSSv2
CVE-2005-0639
Multiple vulnerabilities in xli prior to 1.17 may allow remote malicious users to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.
Xli Xli 1.14
Xli Xli 1.15
Xli Xli 1.16
Xli Xli 1.17
Suse Suse Linux 5.1
Suse Suse Linux 5.2
Suse Suse Linux 5.3
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Altlinux Alt Linux 2.3
Suse Suse Linux 4.4
Suse Suse Linux 5.0
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.2
Suse Suse Linux 8.0
Suse Suse Linux 8.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »