Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sk8 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote malicious users to execute arbitrary commands.
Caldera Openlinux Ebuilder 3.0
Caldera Openlinux Eserver 2.3
Redhat Linux 7.0
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
4 EDB exploits
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started