Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 7.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0388
time server daemon timed allows remote malicious users to cause a denial of service via malformed packets.
Suse Suse Linux 6.2
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Freebsd Freebsd
Mandrakesoft Mandrake Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2001-0458
Multiple buffer overflows in ePerl prior to 2.2.14-0.7 allow local and remote malicious users to execute arbitrary commands.
Ralf S. Engelschall Eperl 2.2.13
Ralf S. Engelschall Eperl 2.2.12
Mandrakesoft Mandrake Linux 7.2
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.3
Suse Suse Linux 6.4
NA
CVE-2001-0178
kdesu program in KDE2 (KDE prior to 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.
Conectiva Linux 6.0
Suse Suse Linux 6.2
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 7.0
Caldera Openlinux Edesktop 2.4
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-1095
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Conectiva Linux 5.1
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Suse Suse Linux 7.0
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Mandrakesoft Mandrake Linux 7.2
Hp Hp-ux 11.11
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Caldera Openlinux
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Caldera Openlinux Eserver 2.3
Redhat Linux 6.2e
Suse Suse Linux 7.0
Caldera Openlinux Edesktop 2.4
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 6.1
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4