Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Redhat Linux 6.0
Redhat Linux 6.1
Debian Debian Linux 2.2
Linux Linux Kernel 2.2.12
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.14
Redhat Linux 6.2
NA
CVE-2012-2313
The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel prior to 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
Linux Linux Kernel 3.3
Linux Linux Kernel 3.3.2
Linux Linux Kernel 3.3.3
Linux Linux Kernel
Linux Linux Kernel 3.3.4
Linux Linux Kernel 3.3.5
Linux Linux Kernel 3.3.1
Novell Suse Linux Enterprise Server 10.0
Redhat Enterprise Linux 5
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Eus 6.2.z
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server Eus 6.1.z
Redhat Enterprise Linux Eus 5.6.z
Redhat Enterprise Linux Long Life 5.6
NA
CVE-2011-3045
Integer signedness error in the png_inflate function in pngrutil.c in libpng prior to 1.4.10beta01, as used in Google Chrome prior to 17.0.963.83 and other products, allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code ...
Google Chrome
Fedoraproject Fedora 17
Fedoraproject Fedora 16
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Workstation 5.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 6.2
Fedoraproject Fedora 15
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Opensuse Opensuse 12.1
Redhat Storage 2.0
Redhat Storage For Public Cloud 2.0
Redhat Gluster Storage 2.0
Libpng Libpng
NA
CVE-2000-0483
The DocumentTemplate package in Zope 2.2 and previous versions allows a remote malicious user to modify DTMLDocuments or DTMLMethods without authorization.
Zope Zope 1.10.3
Redhat Linux Powertools 6.1
Zope Zope 2.1.1
Zope Zope 2.1.7
Redhat Linux Powertools 6.2
NA
CVE-2000-0633
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
Conectiva Linux 4.0
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.1
Conectiva Linux 4.2
Redhat Linux 6.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 6.2
Redhat Linux 6.1
Redhat Linux 6.2e
NA
CVE-2000-0229
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Suse Suse Linux 5.3
Alessandro Rubini Gpm 1.18.1
Alessandro Rubini Gpm 1.19
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Suse Suse Linux 6.0
Suse Suse Linux 6.2
Debian Debian Linux 2.0
Suse Suse Linux 6.1
Suse Suse Linux 6.3
1 EDB exploit
NA
CVE-2000-0508
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote malicious users to cause a denial of service via a malformed request.
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Debian Debian Linux 2.1
Debian Debian Linux 2.2
1 EDB exploit
NA
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 5.1
Redhat Linux 6.0
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 4.4
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 5.2
NA
CVE-2003-0041
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Mit Kerberos Ftp Client
Redhat Linux 7.0
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Multi Network Firewall 8.2
NA
CVE-2012-0876
The XML parser (xmlparse.c) in expat prior to 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via an XML file with many identifiers wit...
Libexpat Project Libexpat
Python Python
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.3
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »