Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  >> 5.2  Security Vulnerabilities
Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.
CVSS Score
2.1
EPSS Score
0.001
Published
1999-06-30
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-06-09
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
CVSS Score
4.6
EPSS Score
0.002
Published
1999-03-21
A buffer overflow in lsof allows local users to obtain root privilege.
CVSS Score
7.2
EPSS Score
0.002
Published
1999-02-18
Buffer overflow in Dosemu Slang library in Linux.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-01-04
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
CVSS Score
10.0
EPSS Score
0.005
Published
1998-12-04
Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
CVSS Score
4.6
EPSS Score
0.001
Published
1998-11-19
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
CVSS Score
10.0
EPSS Score
0.067
Published
1997-10-18
Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
CVSS Score
7.5
EPSS Score
0.008
Published
1997-05-21
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-12


Contact Us

Shodan ® - All rights reserved