Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Redhat Linux 5.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-0196
Buffer overflow in mhshow in the Linux nmh package allows remote malicious users to execute commands via malformed MIME headers in an email message.
Nmh Nmh 1.0.2
Redhat Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Turbolinux Turbolinux 3.5b2
NA
CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
Redhat Linux 5.1
Redhat Linux 6.2
Redhat Linux 5.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Redhat Linux 5.2
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
Redhat Linux 6.0
Turbolinux Turbolinux 3.5b2
3 EDB exploits
NA
CVE-2000-0093
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
Redhat Linux 6.1
NA
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.17f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 6.5.9
Sgi Irix 6.5.16f
Sgi Irix 6.5.17m
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
NA
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.17f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 6.5.9
Sgi Irix 6.5.16f
Sgi Irix 6.5.17m
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
NA
CVE-2000-0052
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Mandrakesoft Mandrake Linux 6.0
Redhat Linux 6.1
Turbolinux Turbolinux 3.5b2
Mandrakesoft Mandrake Linux 6.1
2 EDB exploits
NA
CVE-1999-0997
wu-ftp with FTP conversion enabled allows an malicious user to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
University Of Washington Wu-ftpd 2.6.0
Millenux Gmbh Anonftp 2.8.1
University Of Washington Wu-ftpd 2.4.2
University Of Washington Wu-ftpd 2.5.0
Redhat Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.0
1 EDB exploit
NA
CVE-2000-0357
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
Redhat Linux 6.1
NA
CVE-2000-0358
ORBit and gnome-session in Red Hat Linux 6.1 allows remote malicious users to crash a program.
Redhat Linux 6.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »