Filtered by vendor Redhat
Subscriptions
Filtered by product Linux
Subscriptions
Total
700 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2001-0859 | 1 Redhat | 1 Linux | 2025-04-03 | N/A |
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions. | ||||
CVE-2001-0869 | 3 Caldera, Redhat, Suse | 6 Openlinux Eserver, Openlinux Workstation, Linux and 3 more | 2025-04-03 | N/A |
Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands. | ||||
CVE-2001-0872 | 3 Openbsd, Redhat, Suse | 3 Openssh, Linux, Suse Linux | 2025-04-03 | N/A |
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. | ||||
CVE-2001-0873 | 2 Ian Lance Taylor, Redhat | 2 Taylor Uucp, Linux | 2025-04-03 | N/A |
uuxqt in Taylor UUCP package does not properly remove dangerous long options, which allows local users to gain privileges by calling uux and specifying an alternate configuration file with the --config option. | ||||
CVE-2001-0884 | 2 Gnu, Redhat | 4 Mailman, Linux, Powertools and 1 more | 2025-04-03 | N/A |
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users. | ||||
CVE-2001-0886 | 2 Debian, Redhat | 2 Debian Linux, Linux | 2025-04-03 | N/A |
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. | ||||
CVE-2001-0887 | 2 Oliver Rauch, Redhat | 3 Xsane, Linux, Powertools | 2025-04-03 | N/A |
xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files. | ||||
CVE-2001-0889 | 2 Redhat, University Of Cambridge | 3 Linux, Powertools, Exim | 2025-04-03 | N/A |
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters. | ||||
CVE-2001-0890 | 2 Redhat, Sane | 3 Linux, Powertools, Sane | 2025-04-03 | N/A |
Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files. | ||||
CVE-2001-0905 | 2 Procmail, Redhat | 2 Procmail, Linux | 2025-04-03 | N/A |
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running. | ||||
CVE-2001-0906 | 2 Redhat, Tetex | 2 Linux, Tetex | 2025-04-03 | N/A |
teTeX filter before 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr. | ||||
CVE-2001-0946 | 1 Redhat | 1 Linux | 2025-04-03 | N/A |
apmscript in Apmd in Red Hat 7.2 "Enigma" allows local users to create or change the modification dates of arbitrary files via a symlink attack on the LOW_POWER temporary file, which could be used to cause a denial of service, e.g. by creating /etc/nologin and disabling logins. | ||||
CVE-2001-1002 | 1 Redhat | 1 Linux | 2025-04-03 | N/A |
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. | ||||
CVE-2001-1013 | 1 Redhat | 1 Linux | 2025-04-03 | N/A |
Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server. | ||||
CVE-2001-1022 | 3 Gnu, Jgroff, Redhat | 3 Groff, Jgroff, Linux | 2025-04-03 | N/A |
Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff before 1.15, allows remote attackers to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command. | ||||
CVE-2001-1028 | 1 Redhat | 1 Linux | 2025-04-03 | N/A |
Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges. | ||||
CVE-2001-1147 | 2 Andries Brouwer, Redhat | 2 Util-linux, Linux | 2025-04-03 | N/A |
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits. | ||||
CVE-2001-1174 | 2 Elm Development Group, Redhat | 2 Elm, Linux | 2025-04-03 | N/A |
Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header. | ||||
CVE-2001-1175 | 2 Andries Brouwer, Redhat | 2 Util-linux, Linux | 2025-04-03 | N/A |
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing. | ||||
CVE-1999-1095 | 2 Redhat, Slackware | 2 Linux, Slackware Linux | 2025-04-03 | N/A |
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. |