Vulnerabilities
Vulnerable Software
Caldera:  >> Openlinux  Security Vulnerabilities
The default configuration of kdm in Caldera and Mandrake Linux, and possibly other distributions, allows XDMCP connections from any host, which allows remote attackers to obtain sensitive information or bypass additional access restrictions.
CVSS Score
10.0
EPSS Score
0.003
Published
1999-08-22
The KDE klock program allows local users to unlock a session using malformed input.
CVSS Score
4.6
EPSS Score
0.001
Published
1999-06-23
A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable.
CVSS Score
2.1
EPSS Score
0.001
Published
1999-04-27
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
CVSS Score
7.5
EPSS Score
0.006
Published
1999-04-05
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
CVSS Score
7.5
EPSS Score
0.004
Published
1999-03-30
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
CVSS Score
10.0
EPSS Score
0.483
Published
1999-02-09
The debug option in Caldera Linux smail allows remote attackers to execute commands via shell metacharacters in the -D option for the rmail command.
CVSS Score
10.0
EPSS Score
0.019
Published
1999-01-29
Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
CVSS Score
4.6
EPSS Score
0.001
Published
1998-11-19
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
CVSS Score
10.0
EPSS Score
0.168
Published
1998-10-12
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVSS Score
10.0
EPSS Score
0.805
Published
1998-04-08


Contact Us

Shodan ® - All rights reserved