Search Results (6010 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2000-0219 1 Redhat 1 Linux 2025-04-03 N/A
Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.
CVE-2000-0184 2 Mandrakesoft, Redhat 2 Mandrake Linux, Linux 2025-04-03 N/A
Linux printtool sets the permissions of printer configuration files to be world-readable, which allows local attackers to obtain printer share passwords.
CVE-2000-0118 2 Redhat, Sun 3 Linux, Solaris, Sunos 2025-04-03 N/A
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.
CVE-1999-1490 1 Redhat 1 Linux 2025-04-03 N/A
xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.
CVE-1999-1491 1 Redhat 1 Linux 2025-04-03 N/A
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.
CVE-1999-1348 1 Redhat 1 Linux 2025-04-03 N/A
Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.
CVE-2001-0120 3 Immunix, Mandrakesoft, Redhat 3 Immunix, Mandrake Linux, Linux 2025-04-03 N/A
useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.
CVE-1999-1333 1 Redhat 1 Linux 2025-04-03 N/A
automatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded.
CVE-2002-1371 3 Apple, Easy Software Products, Redhat 3 Mac Os X, Cups, Linux 2025-04-03 N/A
filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.
CVE-2001-0128 6 Conectiva, Debian, Freebsd and 3 more 8 Linux, Debian Linux, Freebsd and 5 more 2025-04-03 N/A
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
CVE-2003-0201 7 Apple, Compaq, Hp and 4 more 10 Mac Os X, Tru64, Cifs-9000 Server and 7 more 2025-04-03 N/A
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
CVE-2001-0138 4 Debian, Immunix, Mandrakesoft and 1 more 5 Debian Linux, Immunix, Mandrake Linux and 2 more 2025-04-03 N/A
privatepw program in wu-ftpd before 2.6.1-6 allows local users to overwrite arbitrary files via a symlink attack.
CVE-1999-1332 1 Redhat 1 Linux 2025-04-03 N/A
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
CVE-1999-1328 1 Redhat 1 Linux 2025-04-03 N/A
linuxconf before 1.11.r11-rh3 on Red Hat Linux 5.1 allows local users to overwrite arbitrary files and gain root access via a symlink attack.
CVE-1999-1331 1 Redhat 1 Linux 2025-04-03 N/A
netcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface.
CVE-1999-1329 1 Redhat 1 Linux 2025-04-03 N/A
Buffer overflow in SysVInit in Red Hat Linux 5.1 and earlier allows local users to gain privileges.
CVE-2001-0072 2 Gnu, Redhat 2 Privacy Guard, Linux 2025-04-03 N/A
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
CVE-2001-0071 2 Gnu, Redhat 2 Privacy Guard, Linux 2025-04-03 N/A
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
CVE-2001-1379 2 Guiseppe Tanzilli And Matthias Eckermann, Redhat 2 Mod Auth Pgsql, Linux 2025-04-03 N/A
The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name.
CVE-1999-0894 1 Redhat 1 Linux 2025-04-03 N/A
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.