Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.0 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-1999-0740
Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.
Redhat Linux 5.2
Redhat Linux 4.2
Redhat Linux 6.0
2.1
CVSSv2
CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an malicious user to cause a denial of service via a malformed request.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
2.1
CVSSv2
CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
7.2
CVSSv2
CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Redhat Linux 6.0
Redhat Linux 6.2
Redhat Linux 6.1
1 EDB exploit
4.3
CVSSv2
CVE-2012-1798
The TIFFGetEXIFProperties function in coders/tiff.c in ImageMagick prior to 6.7.6-3 allows remote malicious users to cause a denial of service (out-of-bounds read and crash) via a crafted EXIF IFD in a TIFF image.
Imagemagick Imagemagick
Debian Debian Linux 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.2
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Eus 6.2
Redhat Enterprise Linux Workstation 6.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
7.2
CVSSv2
CVE-2000-1189
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows malicious users to gain privileges.
Redhat Linux 6.0
Redhat Linux 7.0
Redhat Linux 6.2
Redhat Linux 6.1
NA
CVE-2014-0148
Qemu prior to 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_...
Qemu Qemu
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Virtualization 3.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Openstack Platform 5
NA
CVE-2014-0144
QEMU prior to 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host...
Qemu Qemu
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Virtualization 3.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Openstack Platform 5
5.8
CVSSv2
CVE-2017-12150
It was found that samba prior to 4.4.16, 4.5.x prior to 4.5.14, and 4.6.x prior to 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
Samba Samba
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Gluster Storage 3.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
4.8
CVSSv2
CVE-2017-12163
An information leak flaw was found in the way SMB1 protocol was implemented by Samba prior to 4.4.16, 4.5.x prior to 4.5.14, and 4.6.x prior to 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though...
Samba Samba
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Gluster Storage 3.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »