Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Linux
(Redhat)Repositories | https://github.com/mjg59/linux |
#Vulnerabilities | 232 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1999-12-31 | CVE-1999-1331 | netcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface. | Linux | N/A | ||
1999-12-31 | CVE-1999-1330 | The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf. | Debian_linux, Linux | N/A | ||
1999-12-31 | CVE-1999-1329 | Buffer overflow in SysVInit in Red Hat Linux 5.1 and earlier allows local users to gain privileges. | Linux | N/A | ||
1999-12-31 | CVE-1999-1328 | linuxconf before 1.11.r11-rh3 on Red Hat Linux 5.1 allows local users to overwrite arbitrary files and gain root access via a symlink attack. | Linux | N/A | ||
1999-12-31 | CVE-1999-1327 | Buffer overflow in linuxconf 1.11r11-rh2 on Red Hat Linux 5.1 allows local users to gain root privileges via a long LANG environmental variable. | Linux | N/A | ||
1997-02-03 | CVE-1999-1299 | rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. | Linux, Slackware_linux | N/A | ||
1998-11-19 | CVE-1999-1288 | Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program. | Openlinux, Linux, Samba, Turbolinux | N/A | ||
1996-01-02 | CVE-1999-1186 | rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. | Linux, Rxvt, Slackware_linux | N/A | ||
1997-07-17 | CVE-1999-1182 | Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. | Openlinux_lite, Debian_linux, Dld, Lst_power_linux, Linux, Suse_linux | N/A | ||
1997-10-06 | CVE-1999-1095 | sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. | Linux, Slackware_linux | N/A |