Redhat

Linux

230 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 34.57%
  • Published 16.07.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.

  • EPSS 0.08%
  • Published 03.07.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

makewhatis in Linux man package allows local users to overwrite files via a symlink attack.

  • EPSS 0.06%
  • Published 21.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

gkermit in Red Hat Linux is improperly installed with setgid uucp, which allows local users to modify files owned by uucp.

  • EPSS 0.06%
  • Published 21.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.

  • EPSS 0.11%
  • Published 21.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.

  • EPSS 11.01%
  • Published 16.05.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.

  • EPSS 8.49%
  • Published 16.05.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges.

  • EPSS 8.49%
  • Published 16.05.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges.

  • EPSS 0.11%
  • Published 16.05.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.

  • EPSS 0.42%
  • Published 03.05.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when...