Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2000-1213
ping in iputils prior to 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
Immunix Immunix 6.2
Iputils Iputils
Redhat Linux 6.2
Redhat Linux 7.0
4.6
CVSSv2
CVE-2000-1214
Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils prior to 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
Immunix Immunix 6.2
Iputils Iputils
Redhat Linux 6.2
Redhat Linux 7.0
2.1
CVSSv2
CVE-2000-0816
Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.
Redhat Linux 6.2
Redhat Linux 7.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-1125
restore 0.4b15 and previous versions in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Redhat Linux 6.2
Redhat Linux 6.2e
3 EDB exploits
7.5
CVSSv2
CVE-2001-1002
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and previous versions does not run dvips in secure mode when dvips is executed by lpd, which could allow remote malicious users to gain privileges by printing a DVI file that contains malicious command...
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
1 EDB exploit
1 Github repository
2.1
CVSSv2
CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
7.2
CVSSv2
CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
2.1
CVSSv2
CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an malicious user to cause a denial of service via a malformed request.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
6.5
CVSSv3
CVE-2012-1798
The TIFFGetEXIFProperties function in coders/tiff.c in ImageMagick prior to 6.7.6-3 allows remote malicious users to cause a denial of service (out-of-bounds read and crash) via a crafted EXIF IFD in a TIFF image.
Imagemagick Imagemagick
Debian Debian Linux 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.2
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Server Eus 6.2
Redhat Enterprise Linux Workstation 6.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
7.2
CVSSv2
CVE-2002-0506
Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and previous versions may allow malicious users to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
Redhat Linux 7.2
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2024-52884
CVE-2025-25085
CVE-2025-20124
login-box
CVE-2025-1114
bnielsen
log injection
CVE-2025-0411
metagauss
CVE-2024-57357
malicious code
file upload
impronta
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »