Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  >> 4.0  Security Vulnerabilities
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVSS Score
10.0
EPSS Score
0.805
Published
1998-04-08
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
CVSS Score
10.0
EPSS Score
0.067
Published
1997-10-18
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-07-17
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
CVSS Score
7.2
EPSS Score
0.003
Published
1997-05-29
Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
CVSS Score
7.5
EPSS Score
0.008
Published
1997-05-21
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
CVSS Score
10.0
EPSS Score
0.055
Published
1997-04-07
ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.
CVSS Score
7.2
EPSS Score
0.002
Published
1997-02-20
Buffer overflow in NLS (Natural Language Service).
CVSS Score
7.5
EPSS Score
0.072
Published
1997-02-13
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.
CVSS Score
10.0
EPSS Score
0.005
Published
1997-02-03
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-12


Contact Us

Shodan ® - All rights reserved