Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mandrakesoft mandrake linux 7.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0142
squid 2.3 and previous versions allows local users to overwrite arbitrary files via a symlink attack in some configurations.
National Science Foundation Squid Web Proxy 2.3 Stable4
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Trustix Secure Linux 1.2
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2001-0125
exmh 2.2 and previous versions allows local users to overwrite arbitrary files via a symlink attack on the exmhErrorMsg temporary file.
Exmh Exmh
Mandrakesoft Mandrake Linux 7.2
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-1095
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Conectiva Linux 5.1
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Suse Suse Linux 7.0
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Mandrakesoft Mandrake Linux 7.2
Hp Hp-ux 11.11
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Caldera Openlinux
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Caldera Openlinux Eserver 2.3
Redhat Linux 6.2e
Suse Suse Linux 7.0
Caldera Openlinux Edesktop 2.4
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 6.1
2 EDB exploits
NA
CVE-2000-1042
Buffer overflow in ypserv in Mandrake Linux 7.1 and previous versions, and possibly other Linux operating systems, allows an malicious user to gain root privileges when ypserv is built without a vsyslog() function.
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-1043
Format string vulnerability in ypserv in Mandrake Linux 7.1 and previous versions, and possibly other Linux operating systems, allows an malicious user to gain root privileges when ypserv is built without a vsyslog() function.
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-1059
The default configuration of the Xsession file in Mandrake Linux 7.1 and 7.0 bypasses the Xauthority access control mechanism with an "xhost + localhost" command, which allows local users to sniff X Windows events and gain privileges.
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
NA
CVE-2000-0883
The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 up to and including 7.1 sets the /perl/ directory to be browseable, which allows remote malicious users to list the contents of that directory.
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
NA
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Debian Debian Linux 2.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Slackware Slackware Linux
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »