Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  Security Vulnerabilities
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
CVSS Score
5.4
EPSS Score
0.11
Published
1998-04-08
ifdhcpc-done script for configuring DHCP on Red Hat Linux 5 allows local users to append text to arbitrary files via a symlink attack on the dhcplog file.
CVSS Score
2.1
EPSS Score
0.001
Published
1998-03-09
A Unix account has a default, null, blank, or missing password.
CVSS Score
7.5
EPSS Score
0.423
Published
1998-03-01
Buffer overflow in SGI IRIX mailx program.
CVSS Score
4.6
EPSS Score
0.006
Published
1998-01-25
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
CVSS Score
10.0
EPSS Score
0.067
Published
1997-10-18
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-10-06
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-07-17
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
CVSS Score
7.2
EPSS Score
0.003
Published
1997-05-29
Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
CVSS Score
7.5
EPSS Score
0.008
Published
1997-05-21
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
CVSS Score
10.0
EPSS Score
0.055
Published
1997-04-07


Contact Us

Shodan ® - All rights reserved