Redhat

Linux

230 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

getty_ps 2.0.7j allows local users to overwrite arbitrary files via a symlink attack.

  • EPSS 0.07%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.

  • EPSS 0.06%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.

  • EPSS 0.08%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

privatepw program in wu-ftpd before 2.6.1-6 allows local users to overwrite arbitrary files via a symlink attack.

  • EPSS 0.08%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.

  • EPSS 0.07%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

arpwatch 2.1a4 allows local users to overwrite arbitrary files via a symlink attack in some configurations.

  • EPSS 0.08%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

squid 2.3 and earlier allows local users to overwrite arbitrary files via a symlink attack in some configurations.

  • EPSS 0.07%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.

Exploit
  • EPSS 0.21%
  • Published 09.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.

Exploit
  • EPSS 0.15%
  • Published 09.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.