Логотип exploitDog
source:"redhat"
Консоль
Логотип exploitDog

exploitDog

source:"redhat"

Количество 38 854

Количество 38 854

redhat логотип

CVE-2001-0819

около 24 лет назад

A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.

EPSS: Низкий
redhat логотип

CVE-2001-0816

почти 24 года назад

OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.

EPSS: Низкий
redhat логотип

CVE-2001-0787

около 24 лет назад

LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.

EPSS: Низкий
redhat логотип

CVE-2001-0784

почти 24 года назад

Directory traversal vulnerability in Icecast 1.3.10 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot) attack using encoded URL characters.

EPSS: Средний
redhat логотип

CVE-2001-0775

почти 24 года назад

Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.

EPSS: Средний
redhat логотип

CVE-2001-0763

около 24 лет назад

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.

EPSS: Средний
redhat логотип

CVE-2001-0736

около 24 лет назад

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.

EPSS: Низкий
redhat логотип

CVE-2001-0731

почти 24 года назад

Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.

EPSS: Высокий
redhat логотип

CVE-2001-0730

больше 23 лет назад

split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header.

EPSS: Низкий
redhat логотип

CVE-2001-0691

около 24 лет назад

Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.

EPSS: Низкий
redhat логотип

CVE-2001-0690

около 24 лет назад

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.

EPSS: Средний
redhat логотип

CVE-2001-0670

почти 24 года назад

Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.

EPSS: Средний
redhat логотип

CVE-2001-0653

почти 24 года назад

Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.

EPSS: Низкий
redhat логотип

CVE-2001-0641

около 24 лет назад

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.

EPSS: Низкий
redhat логотип

CVE-2001-0635

около 24 лет назад

Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.

EPSS: Низкий
redhat логотип

CVE-2001-0596

около 24 лет назад

Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.

EPSS: Средний
redhat логотип

CVE-2001-0572

больше 24 лет назад

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.

EPSS: Низкий
redhat логотип

CVE-2001-0570

около 24 лет назад

minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks.

EPSS: Низкий
redhat логотип

CVE-2001-0569

больше 24 лет назад

Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.

EPSS: Низкий
redhat логотип

CVE-2001-0568

больше 24 лет назад

Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2001-0819

A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.

7%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0816

OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.

0%
Низкий
почти 24 года назад
redhat логотип
CVE-2001-0787

LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.

0%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0784

Directory traversal vulnerability in Icecast 1.3.10 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot) attack using encoded URL characters.

11%
Средний
почти 24 года назад
redhat логотип
CVE-2001-0775

Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.

26%
Средний
почти 24 года назад
redhat логотип
CVE-2001-0763

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.

25%
Средний
около 24 лет назад
redhat логотип
CVE-2001-0736

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.

0%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0731

Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.

72%
Высокий
почти 24 года назад
redhat логотип
CVE-2001-0730

split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header.

8%
Низкий
больше 23 лет назад
redhat логотип
CVE-2001-0691

Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.

0%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0690

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.

20%
Средний
около 24 лет назад
redhat логотип
CVE-2001-0670

Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.

16%
Средний
почти 24 года назад
redhat логотип
CVE-2001-0653

Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.

0%
Низкий
почти 24 года назад
redhat логотип
CVE-2001-0641

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.

0%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0635

Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.

0%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0596

Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.

18%
Средний
около 24 лет назад
redhat логотип
CVE-2001-0572

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.

7%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0570

minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks.

0%
Низкий
около 24 лет назад
redhat логотип
CVE-2001-0569

Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.

0%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0568

Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.

0%
Низкий
больше 24 лет назад

Уязвимостей на страницу