Filtered by vendor Redhat Subscriptions
Filtered by product Linux Subscriptions
Total 703 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-1186 3 Redhat, Rxvt, Slackware 3 Linux, Rxvt, Slackware Linux 2025-04-03 N/A
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
CVE-2002-0378 2 Astart Technologies, Redhat 3 Lprng, Enterprise Linux, Linux 2025-04-03 N/A
The default configuration of LPRng print spooler in Red Hat Linux 7.0 through 7.3, Mandrake 8.1 and 8.2, and other operating systems, accepts print jobs from arbitrary remote hosts.
CVE-2002-0384 2 Redhat, Rob Flynn 4 Enterprise Linux, Linux, Powertools and 1 more 2025-04-03 N/A
Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code.
CVE-1999-1347 1 Redhat 1 Linux 2025-04-03 N/A
Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm.
CVE-2002-0388 2 Gnu, Redhat 5 Mailman, Enterprise Linux, Linux and 2 more 2025-04-03 N/A
Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries.
CVE-2001-1162 3 Hp, Redhat, Samba 3 Cifs-9000 Server, Linux, Samba 2025-04-03 N/A
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
CVE-1999-1490 1 Redhat 1 Linux 2025-04-03 N/A
xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.
CVE-1999-1491 1 Redhat 1 Linux 2025-04-03 N/A
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.
CVE-1999-1496 3 Debian, Redhat, Todd Miller 3 Debian Linux, Linux, Sudo 2025-04-03 N/A
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
CVE-2001-1268 2 Info-zip, Redhat 3 Unzip, Enterprise Linux, Linux 2025-04-03 N/A
Directory traversal vulnerability in Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename.
CVE-2000-0093 1 Redhat 1 Linux 2025-04-03 N/A
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
CVE-2001-1350 2 Namazu, Redhat 2 Namazu, Linux 2025-04-03 N/A
Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter.
CVE-2000-0118 2 Redhat, Sun 3 Linux, Solaris, Sunos 2025-04-03 N/A
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.
CVE-2001-1353 2 Aladdin Enterprises, Redhat 2 Ghostscript, Linux 2025-04-03 N/A
ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled.
CVE-2000-0184 2 Mandrakesoft, Redhat 2 Mandrake Linux, Linux 2025-04-03 N/A
Linux printtool sets the permissions of printer configuration files to be world-readable, which allows local attackers to obtain printer share passwords.
CVE-2001-1375 2 Conectiva, Redhat 2 Linux, Linux 2025-04-03 N/A
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
CVE-2001-1378 2 Fetchmail, Redhat 2 Fetchmail, Linux 2025-04-03 N/A
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
CVE-2001-1384 2 Linux, Redhat 2 Linux Kernel, Linux 2025-04-03 N/A
ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
CVE-2001-1388 2 Netfilter, Redhat 2 Iptables, Linux 2025-04-03 N/A
iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
CVE-2001-1393 2 Linux, Redhat 2 Linux Kernel, Linux 2025-04-03 N/A
Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang).