Search Results (5522 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2000-0031 1 Redhat 1 Linux 2025-04-03 N/A
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.
CVE-2000-0052 3 Mandrakesoft, Redhat, Turbolinux 3 Mandrake Linux, Linux, Turbolinux 2025-04-03 N/A
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
CVE-2000-0093 1 Redhat 1 Linux 2025-04-03 N/A
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
CVE-2000-0170 2 Redhat, Turbolinux 2 Linux, Turbolinux 2025-04-03 N/A
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
CVE-2000-0263 1 Redhat 1 Linux 2025-04-03 N/A
The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request.
CVE-2000-0219 1 Redhat 1 Linux 2025-04-03 N/A
Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.
CVE-2000-0229 4 Alessandro Rubini, Debian, Redhat and 1 more 4 Gpm, Debian Linux, Linux and 1 more 2025-04-03 N/A
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
CVE-2000-0230 2 Halloween, Redhat 2 Halloween Linux, Linux 2025-04-03 N/A
Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable.
CVE-2000-0286 1 Redhat 1 Linux 2025-04-03 N/A
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
CVE-2000-0336 4 Mandrakesoft, Openldap, Redhat and 1 more 4 Mandrake Linux, Openldap, Linux and 1 more 2025-04-03 N/A
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
CVE-2001-1322 2 Redhat, Xinetd 2 Linux, Xinetd 2025-04-03 N/A
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
CVE-2000-0357 1 Redhat 1 Linux 2025-04-03 N/A
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
CVE-2000-0358 1 Redhat 1 Linux 2025-04-03 N/A
ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program.
CVE-2000-0389 3 Cygnus, Mit, Redhat 5 Cygnus Network Security, Kerbnet, Kerberos and 2 more 2025-04-03 N/A
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
CVE-2000-0390 3 Cygnus, Mit, Redhat 5 Cygnus Network Security, Kerbnet, Kerberos and 2 more 2025-04-03 N/A
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges.
CVE-2000-0483 2 Redhat, Zope 2 Linux Powertools, Zope 2025-04-03 N/A
The DocumentTemplate package in Zope 2.2 and earlier allows a remote attacker to modify DTMLDocuments or DTMLMethods without authorization.
CVE-2002-0162 2 Logwatch, Redhat 3 Logwatch, Linux, Powertools 2025-04-03 N/A
LogWatch before 2.5 allows local users to execute arbitrary code via a symlink attack on the logwatch temporary directory.
CVE-2002-0163 2 Redhat, Squid 2 Linux, Squid 2025-04-03 N/A
Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses.
CVE-2002-0165 2 Logwatch, Redhat 3 Logwatch, Linux, Powertools 2025-04-03 N/A
LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162.
CVE-2002-0167 2 Enlightenment, Redhat 2 Imlib, Linux 2025-04-03 N/A
Imlib before 1.9.13 sometimes uses the NetPBM package to load trusted images, which could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain weaknesses of NetPBM.