Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  Security Vulnerabilities
Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.
CVSS Score
10.0
EPSS Score
0.03
Published
1999-12-21
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
CVSS Score
7.5
EPSS Score
0.038
Published
1999-12-20
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
CVSS Score
5.0
EPSS Score
0.014
Published
1999-12-08
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
CVSS Score
7.5
EPSS Score
0.004
Published
1999-12-03
ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program.
CVSS Score
5.0
EPSS Score
0.007
Published
1999-12-03
Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets.
CVSS Score
2.1
EPSS Score
0.002
Published
1999-11-23
Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname.
CVSS Score
10.0
EPSS Score
0.012
Published
1999-11-09
Pluggable Authentication Modules (PAM) in Red Hat Linux 6.1 does not properly lock access to disabled NIS accounts.
CVSS Score
4.6
EPSS Score
0.001
Published
1999-10-13
PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file.
CVSS Score
7.5
EPSS Score
0.005
Published
1999-10-07
Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm.
CVSS Score
4.6
EPSS Score
0.001
Published
1999-10-07


Contact Us

Shodan ® - All rights reserved