Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.2 vulnerabilities and exploits
(subscribe to this query)
735
VMScore
CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.1
Redhat Linux 6.0
Redhat Linux 6.2
Turbolinux Turbolinux 3.5b2
Turbolinux Turbolinux 4.2
Redhat Linux 5.0
Redhat Linux 5.2
Turbolinux Turbolinux 4.4
3 EDB exploits
730
VMScore
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.0
Conectiva Linux 4.0es
Immunix Immunix 6.2
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Caldera Openlinux Eserver 2.3
Hp Hp-ux 11.11
Redhat Linux 6.0
Redhat Linux 6.1
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.2e
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.0
2 EDB exploits
730
VMScore
CVE-2000-1009
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Redhat Linux 6.2
Trustix Secure Linux 1.1
2 EDB exploits
730
VMScore
CVE-2000-0230
Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable.
Halloween Halloween Linux 4.0
Redhat Linux 6.1
Redhat Linux 6.2
2 EDB exploits
725
VMScore
CVE-2017-1000253
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backpo...
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.2
Redhat Enterprise Linux 7.1
Redhat Enterprise Linux 6.7
Redhat Enterprise Linux 7.3
Centos Centos 6.0
Centos Centos 6.1
Centos Centos 6.2
Centos Centos 6.3
Centos Centos 6.4
Centos Centos 6.5
Centos Centos 6.6
Centos Centos 6.7
Centos Centos 6.8
Centos Centos 6.9
Centos Centos 7.1611
Centos Centos 7.1511
Centos Centos 7.1503
Centos Centos 7.1406
Redhat Enterprise Linux 6.1
Redhat Enterprise Linux 6.2
1 EDB exploit
1 Article
725
VMScore
CVE-2002-0004
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
Caldera Openlinux Workstation 3.1
Caldera Openlinux Server 3.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Netbsd Netbsd 1.5.2
Redhat Linux 6.2
Redhat Linux 7.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 7.2
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 7.1
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
Slackware Slackware Linux 7.0
Suse Suse Linux 7.3
Mandrakesoft Mandrake Linux 8.0
Redhat Linux 7.0
Slackware Slackware Linux 7.1
Slackware Slackware Linux 8.0
1 EDB exploit
725
VMScore
CVE-2000-1095
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Conectiva Linux 5.1
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
1 EDB exploit
725
VMScore
CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
725
VMScore
CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Redhat Linux 6.0
Redhat Linux 6.2
Redhat Linux 6.1
1 EDB exploit
725
VMScore
CVE-2000-0229
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Suse Suse Linux 5.3
Alessandro Rubini Gpm 1.18.1
Alessandro Rubini Gpm 1.19
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Suse Suse Linux 6.0
Suse Suse Linux 6.2
Debian Debian Linux 2.0
Suse Suse Linux 6.1
Suse Suse Linux 6.3
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »