Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mandrake linux vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2003-0041
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Mit Kerberos Ftp Client
Redhat Linux 7.0
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Multi Network Firewall 8.2
5
CVSSv2
CVE-2000-0508
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote malicious users to cause a denial of service via a malformed request.
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 6.0
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
7.2
CVSSv2
CVE-2004-0834
Format string vulnerability in Speedtouch USB driver prior to 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3.
Speedtouch Speedtouch Usb Driver 1.1
Speedtouch Speedtouch Usb Driver 1.2 Beta3
Speedtouch Speedtouch Usb Driver 1.2 Beta2
Speedtouch Speedtouch Usb Driver 1.0
Speedtouch Speedtouch Usb Driver 1.3
Mandrakesoft Mandrake Multi Network Firewall 8.2
Speedtouch Speedtouch Usb Driver 1.2 Beta1
Speedtouch Speedtouch Usb Driver 1.2
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 9.0
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 10.0
4.6
CVSSv2
CVE-2004-0402
Buffer overflow in xpcd-svga in xpcd prior to 2.08, and possibly other versions, may allow local users to execute arbitrary code.
Xpcd Xpcd 2.08
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
2.1
CVSSv2
CVE-2001-0736
Vulnerability in (1) pine prior to 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
University Of Washington Pine
Immunix Immunix 7.0
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Engardelinux Secure Linux 1.0.1
Mandrakesoft Mandrake Linux 8.0
1 EDB exploit
2.1
CVSSv2
CVE-2004-0587
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 9.0
Suse Suse Linux 8
Mandrakesoft Mandrake Linux 9.2
Redhat Fedora Core Core 1.0
Mandrakesoft Mandrake Linux 10.0
Suse Suse Linux 8.1
7.5
CVSSv2
CVE-2001-1030
Squid prior to 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows malicious users to bypass the ACLs and conduct unauthorized activities such as port scanning.
Squid Squid Web Proxy 2.3stable3
Immunix Immunix 7.0
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Squid Squid Web Proxy 2.3stable4
Mandrakesoft Mandrake Single Network Firewall 7.2
Caldera Openlinux Server 3.1
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 7.0
Trustix Secure Linux 1.01
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 8.0
2.1
CVSSv2
CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Conectiva Linux 10
Mandrakesoft Mandrake Multi Network Firewall 8.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Mandrakesoft Mandrake Linux 9.2
Suse Suse Linux 8.0
Linux Linux Kernel 2.0
Trustix Secure Linux 2
Suse Suse Linux 9.1
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Suse Suse Linux 8.1
1 EDB exploit
7.2
CVSSv2
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Mandrakesoft Mandrake Linux 7.2
Hp Hp-ux 11.11
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Caldera Openlinux
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Caldera Openlinux Eserver 2.3
Redhat Linux 6.2e
Suse Suse Linux 7.0
Caldera Openlinux Edesktop 2.4
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 6.1
2 EDB exploits
7.2
CVSSv2
CVE-2000-0606
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »