Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote malicious users to execute arbitrary commands.
Caldera Openlinux Ebuilder 3.0
Trustix Secure Linux 1.1
Redhat Linux 7.0
Trustix Secure Linux 1.0
Caldera Openlinux
Caldera Openlinux Eserver 2.3
Caldera Openlinux Edesktop 2.4
4 EDB exploits
10
CVSSv2
CVE-2000-1010
Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote malicious users to execute arbitrary commands via a user name that contains format characters.
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 5.0
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
Openbsd Openbsd 2.3
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
10
CVSSv2
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Suse Suse Linux 6.3
Debian Debian Linux 2.3
Debian Debian Linux 2.2
Trustix Secure Linux 1.1
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
Trustix Secure Linux 1.0
Suse Suse Linux 6.4
Suse Suse Linux 7.0
3 EDB exploits
10
CVSSv2
CVE-2000-0389
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
3 EDB exploits
10
CVSSv2
CVE-2000-0390
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
10
CVSSv2
CVE-2000-0391
Buffer overflow in krshd in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
10
CVSSv2
CVE-2000-0248
The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote malicious users to execute arbitrary commands.
Redhat Linux 6.2
2 EDB exploits
10
CVSSv2
CVE-2000-0322
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
Redhat Linux 6.2
1 EDB exploit
10
CVSSv2
CVE-2000-0093
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
Redhat Linux 6.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »