Redhat

Linux

230 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.18%
  • Published 13.02.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in NLS (Natural Language Service).

  • EPSS 0.48%
  • Published 03.02.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the own...

  • EPSS 0.06%
  • Published 12.12.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.

  • EPSS 1.59%
  • Published 04.12.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.

  • EPSS 0.89%
  • Published 16.11.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

Local users can start Sendmail in daemon mode and gain root privileges.

  • EPSS 0.08%
  • Published 08.10.1996 04:00:00
  • Last modified 03.04.2025 01:03:51

Bash treats any character with a value of 255 as a command separator.

  • EPSS 0.1%
  • Published 11.09.1996 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.

Exploit
  • EPSS 0.12%
  • Published 02.02.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.

  • EPSS 0.06%
  • Published 02.01.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.

Exploit
  • EPSS 6.57%
  • Published 19.12.1994 05:00:00
  • Last modified 03.04.2025 01:03:51

rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request.