Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-0233
Buffer overflow in micq client 0.4.6 and previous versions allows remote malicious users to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
Matthew Smith Micq
Debian Debian Linux 2.2
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
1 EDB exploit
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.0
Conectiva Linux 4.0es
Debian Debian Linux 2.2
Debian Debian Linux 2.3
Redhat Linux 6.1
Suse Suse Linux 6.4
Redhat Linux 6.2
Suse Suse Linux 7.0
Redhat Linux 6.0
Suse Suse Linux 6.3
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
3 EDB exploits
10
CVSSv2
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
10
CVSSv2
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
1 EDB exploit
10
CVSSv2
CVE-1999-1542
RPMMail prior to 1.4 allows remote malicious users to execute commands via an e-mail message with shell metacharacters in the "MAIL FROM" command.
Redhat Linux 6.0
10
CVSSv2
CVE-1999-0814
Red Hat pump DHCP client allows remote malicious users to gain root access in some configurations.
Redhat Linux 6.0
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
9.3
CVSSv2
CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an malicious user to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root ...
Fedoraproject Sssd 2.6.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Virtualization Host 4.0
Redhat Virtualization 4.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Server Aus 8.4
Fedoraproject Fedora 34
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »