VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
>
Linux
>
Linux Kernel
> 2.6.20.1
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
1998-11-18
CVE-1999-0780
KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file.
local
low complexity
freebsd
kde
linux
4.6
4.6
1998-04-01
CVE-1999-0257
Unspecified vulnerability in Linux Kernel 2.6.20.1
Nestea variation of teardrop IP fragmentation denial of service.
network
low complexity
linux
5.0
5.0
1998-03-01
CVE-1999-0330
Unspecified vulnerability in Linux Kernel 2.6.20.1
Linux bdash game has a buffer overflow that allows local users to gain root access.
local
low complexity
linux
7.2
7.2
1997-11-01
CVE-1999-0216
Denial of service of inetd on Linux through SYN and RST packets.
network
low complexity
gnu
hp
linux
5.0
5.0
1997-10-02
CVE-1999-0061
File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
network
high complexity
openbsd
freebsd
linux
bsdi
5.1
5.1
1997-09-01
CVE-1999-0183
Linux implementations of TFTP would allow access to files outside the restricted directory.
network
low complexity
tftp
linux
6.4
6.4
1997-08-24
CVE-1999-1225
rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.
network
low complexity
digital
linux
netbsd
openbsd
sun
5.0
5.0
1997-07-01
CVE-1999-0628
The rwho/rwhod service is running, which exposes machine status and user information.
network
low complexity
netbsd
ibm
freebsd
linux
5.0
5.0
1997-07-01
CVE-1999-0195
Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
network
low complexity
sgi
linux
5.0
5.0
1997-07-01
CVE-1999-0074
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
network
low complexity
netbsd
microsoft
freebsd
linux
6.4
6.4
«
Previous
1
2
...
126
127
128
129
(current)
130
»
Next