netcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface.
Max CVSS
2.1
EPSS Score
0.04%
Published
1999-12-31
Updated
2008-09-10
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
Max CVSS
2.1
EPSS Score
0.04%
Published
1999-12-31
Updated
2016-10-18
Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.
Max CVSS
2.1
EPSS Score
0.06%
Published
1999-06-30
Updated
2016-10-18
dumpreg in Red Hat Linux 5.1 opens /dev/mem with O_RDWR access, which allows local users to cause a denial of service (crash) by redirecting fd 1 (stdout) to the kernel.
Max CVSS
2.1
EPSS Score
0.04%
Published
1998-07-29
Updated
2016-10-18
ifdhcpc-done script for configuring DHCP on Red Hat Linux 5 allows local users to append text to arbitrary files via a symlink attack on the dhcplog file.
Max CVSS
2.1
EPSS Score
0.04%
Published
1998-03-09
Updated
2016-10-18
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
Max CVSS
2.1
EPSS Score
0.04%
Published
1999-06-08
Updated
2017-12-19
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Max CVSS
2.1
EPSS Score
0.05%
Published
1996-07-16
Updated
2017-10-19
Linux printtool sets the permissions of printer configuration files to be world-readable, which allows local attackers to obtain printer share passwords.
Max CVSS
2.1
EPSS Score
0.05%
Published
2000-03-09
Updated
2008-09-10
The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-04-16
Updated
2008-09-10
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-04-16
Updated
2008-09-10
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-04-21
Updated
2008-09-10
Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets.
Max CVSS
2.1
EPSS Score
0.04%
Published
1999-11-23
Updated
2017-12-19
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-07-18
Updated
2017-10-10
Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-10-06
Updated
2017-10-10
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-11-14
Updated
2017-10-10
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
Max CVSS
2.1
EPSS Score
0.04%
Published
2001-03-26
Updated
2017-10-10
glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
Max CVSS
2.1
EPSS Score
0.04%
Published
2001-03-26
Updated
2017-10-10
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
Max CVSS
2.1
EPSS Score
0.04%
Published
2001-10-18
Updated
2017-12-19
Memory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service.
Max CVSS
2.6
EPSS Score
3.32%
Published
2002-03-08
Updated
2016-10-18
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed.
Max CVSS
2.1
EPSS Score
0.06%
Published
2002-03-15
Updated
2020-11-16
rhmask 1.0-9 in Red Hat Linux 7.1 allows local users to overwrite arbitrary files via a symlink attack on the mask file.
Max CVSS
2.1
EPSS Score
0.04%
Published
2002-12-31
Updated
2008-09-05
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-08-27
Updated
2017-10-11
GDM before 2.4.1.6, when using the "examine session errors" feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file.
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-08-27
Updated
2017-10-11
Unspecified vulnerability in xscreensaver 4.12, and possibly other versions, allows attackers to cause xscreensaver to crash via unspecified vectors "while verifying the user-password."
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-12-31
Updated
2008-09-05
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Max CVSS
2.1
EPSS Score
0.04%
Published
2004-11-23
Updated
2017-10-11
159 vulnerabilities found
1 2 3 4 5 6 7
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!