Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0144
QEMU prior to 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host...
Qemu Qemu
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Virtualization 3.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Openstack Platform 5
2.1
CVSSv2
CVE-2011-1163
The osf_partition function in fs/partitions/osf.c in the Linux kernel prior to 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table...
Linux Linux Kernel
Suse Linux Enterprise Server 10
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server Aus 5.6
Redhat Enterprise Linux Eus 5.6
10
CVSSv2
CVE-2011-2767
mod_perl 2.0 up to and including 2.0.10 allows malicious users to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP...
Apache Mod Perl
Debian Debian Linux 8.0
Redhat Enterprise Linux 7.4
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux 6.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux 7.3
Redhat Enterprise Linux 7.5
Redhat Enterprise Linux 7.6
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
7.2
CVSSv2
CVE-2000-1189
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows malicious users to gain privileges.
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
Redhat Linux 7.0
2.1
CVSSv2
CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an malicious user to cause a denial of service via a malformed request.
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
1 EDB exploit
2.1
CVSSv2
CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
1 EDB exploit
6.4
CVSSv2
CVE-1999-0740
Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.
Redhat Linux 5.2
Redhat Linux 4.2
Redhat Linux 6.0
6.8
CVSSv2
CVE-2015-5234
IcedTea-Web prior to 1.5.3 and 1.6.x prior to 1.6.1 does not properly sanitize applet URLs, which allows remote malicious users to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly relat...
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Redhat Icedtea 1.6
Redhat Icedtea
Fedoraproject Fedora 22
Fedoraproject Fedora 21
4
CVSSv2
CVE-2012-3166
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and previous versions, and 5.5.25 and previous versions, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Oracle Mysql
Mariadb Mariadb
Redhat Enterprise Linux 6.0
Canonical Ubuntu Linux 11.10
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.10
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Eus 6.3
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »