Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 6.2 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2000-1213
ping in iputils prior to 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
Immunix Immunix 6.2
Iputils Iputils
Redhat Linux 6.2
Redhat Linux 7.0
409
VMScore
CVE-2000-1214
Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils prior to 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
Immunix Immunix 6.2
Iputils Iputils
Redhat Linux 6.2
Redhat Linux 7.0
215
VMScore
CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an malicious user to cause a denial of service via a malformed request.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
215
VMScore
CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
1 EDB exploit
725
VMScore
CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Redhat Linux 6.0
Redhat Linux 6.2
Redhat Linux 6.1
1 EDB exploit
755
VMScore
CVE-2001-1002
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and previous versions does not run dvips in secure mode when dvips is executed by lpd, which could allow remote malicious users to gain privileges by printing a DVI file that contains malicious command...
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
1 EDB exploit
1 Github repository
735
VMScore
CVE-2000-1125
restore 0.4b15 and previous versions in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Redhat Linux 6.2e
Redhat Linux 6.2
3 EDB exploits
215
VMScore
CVE-2000-0816
Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.
Redhat Linux 6.2
Redhat Linux 7.0
1 EDB exploit
641
VMScore
CVE-2000-1189
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows malicious users to gain privileges.
Redhat Linux 6.0
Redhat Linux 7.0
Redhat Linux 6.2
Redhat Linux 6.1
641
VMScore
CVE-2002-0506
Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and previous versions may allow malicious users to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.
Redhat Linux 6.2
Redhat Linux 7.2
Redhat Linux 7.0
Redhat Linux 7.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »