Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-1999-1182 |
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. Published: July 17, 1997; 12:00:00 AM -0400 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-1999-0034 |
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. Published: May 29, 1997; 12:00:00 AM -0400 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-1999-0042 |
Buffer overflow in University of Washington's implementation of IMAP and POP servers. Published: April 07, 1997; 12:00:00 AM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-1999-0868 |
ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN. Published: February 20, 1997; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-1999-0041 |
Buffer overflow in NLS (Natural Language Service). Published: February 13, 1997; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-1999-1299 |
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. Published: February 03, 1997; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-1999-0043 |
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. Published: December 04, 1996; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-1999-0130 |
Local users can start Sendmail in daemon mode and gain root privileges. Published: November 16, 1996; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |