Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  >> 7.0  Security Vulnerabilities
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.
CVSS Score
7.5
EPSS Score
0.01
Published
2001-12-19
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
CVSS Score
2.1
EPSS Score
0.002
Published
2001-10-18
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
CVSS Score
4.6
EPSS Score
0.001
Published
2001-10-18
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
CVSS Score
4.6
EPSS Score
0.003
Published
2001-09-20
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
CVSS Score
7.5
EPSS Score
0.199
Published
2001-09-20
Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.
CVSS Score
5.0
EPSS Score
0.718
Published
2001-09-12
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
CVSS Score
7.5
EPSS Score
0.047
Published
2001-08-31
expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.
CVSS Score
7.2
EPSS Score
0.001
Published
2001-07-19
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
CVSS Score
4.6
EPSS Score
0.001
Published
2001-07-19
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
CVSS Score
7.5
EPSS Score
0.002
Published
2001-07-18


Contact Us

Shodan ® - All rights reserved