Логотип exploitDog
source:"redhat"
Консоль
Логотип exploitDog

exploitDog

source:"redhat"

Количество 38 837

Количество 38 837

redhat логотип

CVE-2001-0072

больше 24 лет назад

gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.

EPSS: Низкий
redhat логотип

CVE-2001-0071

больше 24 лет назад

gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.

EPSS: Низкий
redhat логотип

CVE-2001-0066

больше 24 лет назад

Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.

EPSS: Низкий
redhat логотип

CVE-2001-0060

больше 24 лет назад

Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.

EPSS: Низкий
redhat логотип

CVE-2001-0050

больше 24 лет назад

Buffer overflow in BitchX IRC client allows remote attackers to cause a denial of service and possibly execute arbitrary commands via an IP address that resolves to a long DNS hostname or domain name.

EPSS: Средний
redhat логотип

CVE-2001-0036

больше 24 лет назад

KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.

EPSS: Низкий
redhat логотип

CVE-2001-0026

больше 24 лет назад

rp-pppoe PPPoE client allows remote attackers to cause a denial of service via the Clamp MSS option and a TCP packet with a zero-length TCP option.

EPSS: Средний
redhat логотип

CVE-2001-0013

больше 24 лет назад

Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.

EPSS: Низкий
redhat логотип

CVE-2001-0012

больше 24 лет назад

BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.

EPSS: Средний
redhat логотип

CVE-2001-0011

больше 24 лет назад

Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.

EPSS: Низкий
redhat логотип

CVE-2001-0010

больше 24 лет назад

Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.

EPSS: Средний
redhat логотип

CVE-2000-1254

около 25 лет назад

crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2000-1221

больше 25 лет назад

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.

EPSS: Средний
redhat логотип

CVE-2000-1220

больше 25 лет назад

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.

EPSS: Низкий
redhat логотип

CVE-2000-1214

больше 24 лет назад

Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.

EPSS: Низкий
redhat логотип

CVE-2000-1213

больше 24 лет назад

ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.

EPSS: Низкий
redhat логотип

CVE-2000-1212

больше 24 лет назад

Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.

EPSS: Низкий
redhat логотип

CVE-2000-1211

больше 24 лет назад

Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.

EPSS: Низкий
redhat логотип

CVE-2000-1208

около 25 лет назад

Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.

EPSS: Низкий
redhat логотип

CVE-2000-1207

больше 24 лет назад

userhelper in the usermode package on Red Hat Linux executes non-setuid programs as root, which does not activate the security measures in glibc and allows the programs to be exploited via format string vulnerabilities in glibc via the LANG or LC_ALL environment variables (CVE-2000-0844).

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2001-0072

gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.

1%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0071

gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.

0%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0066

Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.

0%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0060

Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.

1%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0050

Buffer overflow in BitchX IRC client allows remote attackers to cause a denial of service and possibly execute arbitrary commands via an IP address that resolves to a long DNS hostname or domain name.

19%
Средний
больше 24 лет назад
redhat логотип
CVE-2001-0036

KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.

0%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0026

rp-pppoe PPPoE client allows remote attackers to cause a denial of service via the Clamp MSS option and a TCP packet with a zero-length TCP option.

12%
Средний
больше 24 лет назад
redhat логотип
CVE-2001-0013

Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.

9%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0012

BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.

20%
Средний
больше 24 лет назад
redhat логотип
CVE-2001-0011

Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.

7%
Низкий
больше 24 лет назад
redhat логотип
CVE-2001-0010

Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.

45%
Средний
больше 24 лет назад
redhat логотип
CVE-2000-1254

crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.

CVSS2: 4.3
1%
Низкий
около 25 лет назад
redhat логотип
CVE-2000-1221

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.

12%
Средний
больше 25 лет назад
redhat логотип
CVE-2000-1220

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.

3%
Низкий
больше 25 лет назад
redhat логотип
CVE-2000-1214

Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.

0%
Низкий
больше 24 лет назад
redhat логотип
CVE-2000-1213

ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.

1%
Низкий
больше 24 лет назад
redhat логотип
CVE-2000-1212

Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.

1%
Низкий
больше 24 лет назад
redhat логотип
CVE-2000-1211

Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.

1%
Низкий
больше 24 лет назад
redhat логотип
CVE-2000-1208

Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.

0%
Низкий
около 25 лет назад
redhat логотип
CVE-2000-1207

userhelper in the usermode package on Red Hat Linux executes non-setuid programs as root, which does not activate the security measures in glibc and allows the programs to be exploited via format string vulnerabilities in glibc via the LANG or LC_ALL environment variables (CVE-2000-0844).

0%
Низкий
больше 24 лет назад

Уязвимостей на страницу