Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Linux
(Redhat)Repositories | https://github.com/mjg59/linux |
#Vulnerabilities | 232 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1998-03-01 | CVE-1999-0502 | A Unix account has a default, null, blank, or missing password. | Hp\-Ux, Linux, Solaris, Sunos | N/A | ||
1999-02-09 | CVE-1999-0368 | Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto. | Openlinux, Debian_linux, Proftpd, Linux, Openserver, Unixware, Slackware_linux, Wu\-Ftpd | N/A | ||
1999-03-21 | CVE-1999-0433 | XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. | Netbsd, Linux, Slackware_linux, Suse_linux, X11r6 | N/A | ||
1999-06-24 | CVE-1999-0748 | Buffer overflows in Red Hat net-tools package. | Linux | N/A | ||
1999-12-21 | CVE-2000-0017 | Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter. | Linux | N/A | ||
2000-01-04 | CVE-1999-0894 | Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals. | Linux | N/A | ||
2000-01-21 | CVE-2000-0093 | An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5. | Linux | N/A | ||
2000-10-20 | CVE-2000-0031 | The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack. | Linux | N/A | ||
2004-11-23 | CVE-2004-0081 | OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. | Webstar, Mac_os_x, Mac_os_x_server, Converged_communications_server, Intuity_audix, S8300, S8500, S8700, Sg200, Sg203, Sg208, Sg5, Vsu, Cacheos_ca_sa, Proxysg, Firewall\-1, Provider\-1, Vpn\-1, Access_registrar, Application_and_content_networking_software, Call_manager, Ciscoworks_common_management_foundation, Ciscoworks_common_services, Content_services_switch_11500, Css11000_content_services_switch, Css_secure_content_accelerator, Firewall_services_module, Gss_4480_global_site_selector, Gss_4490_global_site_selector, Ios, Mds_9000, Okena_stormwatch, Pix_firewall, Pix_firewall_software, Secure_content_accelerator, Threat_response, Webns, Bsafe_ssl\-J, Freebsd, Aaa_server, Apache\-Based_web_server, Hp\-Ux, Wbem, Speed_technologies_litespeed_web_server, Instant_virtual_extranet, Edirectory, Imanager, Openbsd, Openssl, Enterprise_linux, Enterprise_linux_desktop, Linux, Openssl, Openserver, Sidewinder, Propack, Servercluster, Stonebeat_fullcluster, Stonebeat_securitycluster, Stonebeat_webcluster, Stonegate, Stonegate_vpn_client, Crypto_accelerator_4000, Clientless_vpn_gateway_4400, Tarantella_enterprise, Gsx_server | N/A | ||
2002-03-15 | CVE-2002-0080 | rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed. | Linux, Rsync | N/A |