Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 5.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 4.0
Redhat Linux 4.2
Caldera Openlinux 2.2
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Redhat Linux 4.1
Redhat Linux 5.0
1 EDB exploit
NA
CVE-1999-0768
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.
Redhat Linux 4.2
Redhat Linux 5.2
Redhat Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 6.0
2 EDB exploits
NA
CVE-1999-0740
Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.
Redhat Linux 5.2
Redhat Linux 4.2
Redhat Linux 6.0
NA
CVE-1999-0710
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote malicious users to use it as an intermediary to connect to other systems.
Redhat Linux 6.0
Redhat Linux 5.2
1 EDB exploit
NA
CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local malicious users to conduct brute force password guessing.
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 5.2
Redhat Linux 6.0
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 6.1
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Redhat Linux 5.0
Redhat Linux 5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Redhat Linux 2.0
Redhat Linux 2.1
Sun Solaris
1 EDB exploit
NA
CVE-1999-0433
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Xfree86 Project X11r6 3.3.3
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Netbsd Netbsd 1.3.3
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Netbsd Netbsd 1.3.2
1 EDB exploit
NA
CVE-1999-0405
A buffer overflow in lsof allows local users to obtain root privilege.
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Suse Suse Linux 6.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 4.4.1
Suse Suse Linux 5.0
Debian Debian Linux 2.0
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Suse Suse Linux 5.1
Suse Suse Linux 5.3
Debian Debian Linux 2.0.5
2 EDB exploits
NA
CVE-1999-0390
Buffer overflow in Dosemu Slang library in Linux.
Redhat Linux 4.0
Suse Suse Linux 5.0
Suse Suse Linux 5.1
Redhat Linux 4.2
Redhat Linux 5.1
Redhat Linux 4.1
Redhat Linux 5.0
Redhat Linux 5.2
NA
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
NA
CVE-1999-0125
Buffer overflow in SGI IRIX mailx program.
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.3
Redhat Linux 4.2
Sun Sunos 5.5
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 2.6
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos -
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
NEXT »