Filtered by vendor Redhat Subscriptions
Filtered by product Linux Subscriptions
Total 250 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0405 4 Debian, Freebsd, Redhat and 1 more 4 Debian Linux, Freebsd, Linux and 1 more 2008-09-09 N/A
A buffer overflow in lsof allows local users to obtain root privilege.
CVE-1999-0390 2 Redhat, Suse 2 Linux, Suse Linux 2008-09-09 N/A
Buffer overflow in Dosemu Slang library in Linux.
CVE-1999-0131 8 Bsdi, Digital, Eric Allman and 5 more 9 Bsd Os, Osf 1, Sendmail and 6 more 2008-09-09 N/A
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
CVE-1999-0130 7 Bsdi, Caldera, Eric Allman and 4 more 7 Bsd Os, Network Desktop, Sendmail and 4 more 2008-09-09 N/A
Local users can start Sendmail in daemon mode and gain root privileges.
CVE-2003-0194 1 Redhat 2 Linux, Tcpdump 2008-09-05 N/A
tcpdump does not properly drop privileges to the pcap user when starting up.
CVE-2002-0506 1 Redhat 1 Linux 2008-09-05 N/A
Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and earlier may allow attackers to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.
CVE-2001-1375 2 Conectiva, Redhat 2 Linux, Linux 2008-09-05 N/A
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
CVE-2001-1028 1 Redhat 1 Linux 2008-09-05 N/A
Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.
CVE-2000-0751 3 Netbsd, Openbsd, Redhat 3 Netbsd, Openbsd, Linux 2008-09-05 N/A
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
CVE-1999-0997 3 Millenux Gmbh, Redhat, University Of Washington 3 Anonftp, Linux, Wu-ftpd 2008-09-05 N/A
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.