Filtered by vendor Redhat
Subscriptions
Filtered by product Linux
Subscriptions
Total
701 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2001-1013 | 1 Redhat | 1 Linux | 2024-08-08 | N/A |
Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server. | ||||
CVE-2001-0834 | 5 Conectiva, Debian, Htdig and 2 more | 5 Linux, Debian Linux, Htdig and 2 more | 2024-08-08 | N/A |
htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file. | ||||
CVE-2001-0977 | 4 Debian, Mandrakesoft, Openldap and 1 more | 6 Debian Linux, Mandrake Linux, Mandrake Linux Corporate Server and 3 more | 2024-08-08 | N/A |
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field. | ||||
CVE-2001-0884 | 2 Gnu, Redhat | 4 Mailman, Linux, Powertools and 1 more | 2024-08-08 | N/A |
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users. | ||||
CVE-2001-1009 | 2 Fetchmail, Redhat | 2 Fetchmail, Linux | 2024-08-08 | N/A |
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request. | ||||
CVE-2001-0946 | 1 Redhat | 1 Linux | 2024-08-08 | N/A |
apmscript in Apmd in Red Hat 7.2 "Enigma" allows local users to create or change the modification dates of arbitrary files via a symlink attack on the LOW_POWER temporary file, which could be used to cause a denial of service, e.g. by creating /etc/nologin and disabling logins. | ||||
CVE-2001-0835 | 2 Bradford Barrett, Redhat | 3 Webalizer, Linux, Powertools | 2024-08-08 | N/A |
Cross-site scripting vulnerability in Webalizer 2.01-06, and possibly other versions, allows remote attackers to inject arbitrary HTML tags by specifying them in (1) search keywords embedded in HTTP referrer information, or (2) host names that are retrieved via a reverse DNS lookup. | ||||
CVE-2001-0887 | 2 Oliver Rauch, Redhat | 3 Xsane, Linux, Powertools | 2024-08-08 | N/A |
xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files. | ||||
CVE-2001-0905 | 2 Procmail, Redhat | 2 Procmail, Linux | 2024-08-08 | N/A |
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running. | ||||
CVE-2001-0869 | 3 Caldera, Redhat, Suse | 6 Openlinux Eserver, Openlinux Workstation, Linux and 3 more | 2024-08-08 | N/A |
Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands. | ||||
CVE-2001-0889 | 2 Redhat, University Of Cambridge | 3 Linux, Powertools, Exim | 2024-08-08 | N/A |
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters. | ||||
CVE-2001-0819 | 2 Fetchmail, Redhat | 2 Fetchmail, Linux | 2024-08-08 | N/A |
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header. | ||||
CVE-2001-1002 | 1 Redhat | 1 Linux | 2024-08-08 | N/A |
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. | ||||
CVE-2001-0843 | 2 Redhat, Squid | 2 Linux, Squid Web Proxy | 2024-08-08 | N/A |
Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request. | ||||
CVE-2001-0906 | 2 Redhat, Tetex | 2 Linux, Tetex | 2024-08-08 | N/A |
teTeX filter before 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr. | ||||
CVE-2001-0872 | 3 Openbsd, Redhat, Suse | 3 Openssh, Linux, Suse Linux | 2024-08-08 | N/A |
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. | ||||
CVE-2001-0859 | 1 Redhat | 1 Linux | 2024-08-08 | N/A |
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions. | ||||
CVE-2001-0825 | 2 Redhat, Xinetd | 2 Linux, Xinetd | 2024-08-08 | N/A |
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check. | ||||
CVE-2001-0886 | 2 Debian, Redhat | 2 Debian Linux, Linux | 2024-08-08 | N/A |
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. | ||||
CVE-2001-0873 | 2 Ian Lance Taylor, Redhat | 2 Taylor Uucp, Linux | 2024-08-08 | N/A |
uuxqt in Taylor UUCP package does not properly remove dangerous long options, which allows local users to gain privileges by calling uux and specifying an alternate configuration file with the --config option. |