Product:

Linux

(Redhat)
Repositories https://github.com/mjg59/linux
#Vulnerabilities 233
Date ID Summary Products Score Patch
2000-05-16 CVE-2000-0392 Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux N/A
2000-05-16 CVE-2000-0391 Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux N/A
2000-05-16 CVE-2000-0390 Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux N/A
2000-05-16 CVE-2000-0389 Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges. Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux N/A
2018-12-21 CVE-2018-20346 SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. Debian_linux, Chrome, Leap, Linux, Sqlite 8.1
2005-04-14 CVE-2005-0004 The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files. Debian_linux, Linux, Mysql, Mysql, Fedora_core, Linux N/A
2018-10-09 CVE-2018-17962 Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used. Ubuntu_linux, Debian_linux, Linux, Qemu, Linux, Linux_enterprise_server 7.5
2018-12-21 CVE-2018-20346 SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. Debian_linux, Chrome, Leap, Linux, Sqlite 8.1
2016-10-07 CVE-2016-3699 The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd. Linux_kernel, Enterprise_mrg, Linux 7.4
2017-12-11 CVE-2014-3250 The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4. Puppet, Linux 6.5