CVE-1999-0041
- EPSS 7.18%
- Veröffentlicht 13.02.1997 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in NLS (Natural Language Service).
- EPSS 0.48%
- Veröffentlicht 03.02.1997 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the own...
CVE-1999-0297
- EPSS 0.06%
- Veröffentlicht 12.12.1996 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
- EPSS 1.59%
- Veröffentlicht 04.12.1996 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
CVE-1999-0130
- EPSS 0.89%
- Veröffentlicht 16.11.1996 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Local users can start Sendmail in daemon mode and gain root privileges.
CVE-1999-0234
- EPSS 0.08%
- Veröffentlicht 08.10.1996 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Bash treats any character with a value of 255 as a command separator.
CVE-1999-0131
- EPSS 0.1%
- Veröffentlicht 11.09.1996 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
CVE-1999-1491
- EPSS 0.12%
- Veröffentlicht 02.02.1996 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.
CVE-1999-1186
- EPSS 0.06%
- Veröffentlicht 02.01.1996 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
- EPSS 6.57%
- Veröffentlicht 19.12.1994 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request.