Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  >> 7.3  Security Vulnerabilities
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
CVSS Score
7.5
EPSS Score
0.199
Published
2001-09-20
The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.
CVSS Score
4.6
EPSS Score
0.001
Published
2000-10-20
userhelper in the usermode package on Red Hat Linux executes non-setuid programs as root, which does not activate the security measures in glibc and allows the programs to be exploited via format string vulnerabilities in glibc via the LANG or LC_ALL environment variables (CVE-2000-0844).
CVSS Score
7.2
EPSS Score
0.002
Published
2000-09-30
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
CVSS Score
10.0
EPSS Score
0.004
Published
2000-01-04
Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.
CVSS Score
10.0
EPSS Score
0.03
Published
1999-12-21
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
CVSS Score
10.0
EPSS Score
0.005
Published
1998-12-04
Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
CVSS Score
4.6
EPSS Score
0.001
Published
1998-11-19
Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
CVSS Score
7.5
EPSS Score
0.008
Published
1997-05-21
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-12


Contact Us

Shodan ® - All rights reserved