Vulnerabilities > Linux > Linux Kernel

DATE CVE VULNERABILITY TITLE RISK
1998-06-22 CVE-1999-1442 Unspecified vulnerability in Linux Kernel
Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.
local
low complexity
linux
7.2
1998-04-01 CVE-1999-0257 Unspecified vulnerability in Linux Kernel 2.6.20.1
Nestea variation of teardrop IP fragmentation denial of service.
network
low complexity
linux
5.0
1998-03-01 CVE-1999-0330 Unspecified vulnerability in Linux Kernel 2.6.20.1
Linux bdash game has a buffer overflow that allows local users to gain root access.
local
low complexity
linux
7.2
1998-01-05 CVE-1999-0513 ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service.
network
low complexity
sun digital ibm freebsd linux hp netbsd
5.0
1997-11-01 CVE-1999-0216 Denial of service of inetd on Linux through SYN and RST packets.
network
low complexity
gnu hp linux
5.0
1997-10-02 CVE-1999-0061 File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
network
high complexity
openbsd freebsd linux bsdi
5.1
1997-09-01 CVE-1999-0183 Linux implementations of TFTP would allow access to files outside the restricted directory.
network
low complexity
tftp linux
6.4
1997-08-24 CVE-1999-1225 rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.
network
low complexity
digital linux netbsd openbsd sun
5.0
1997-07-01 CVE-1999-0628 The rwho/rwhod service is running, which exposes machine status and user information.
network
low complexity
netbsd ibm freebsd linux
5.0
1997-07-01 CVE-1999-0195 Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
network
low complexity
sgi linux
5.0