Vulnerabilities > Linux > Linux Kernel
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-01-26 | CVE-1999-0400 | Unspecified vulnerability in Linux Kernel 2.2.0 Denial of service in Linux 2.2.0 running the ldd command on a core file. | 4.6 |
1999-01-19 | CVE-1999-0451 | Unspecified vulnerability in Linux Kernel 2.0/2.2.0 Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. | 2.1 |
1999-01-01 | CVE-1999-0656 | Configuration vulnerability in Linux Kernel The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. | 5.0 |
1999-01-01 | CVE-1999-0401 | Unspecified vulnerability in Linux Kernel 2.2.1 A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files. | 3.7 |
1998-12-27 | CVE-1999-1285 | Unspecified vulnerability in Linux Kernel Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. | 2.1 |
1998-12-07 | CVE-1999-1276 | fte-console in the fte package before 0.46b-4.1 does not drop root privileges, which allows local users to gain root access via the virtual console device. | 7.2 |
1998-11-18 | CVE-1999-0782 | KDE kppp allows local users to create a directory in an arbitrary location via the HOME environmental variable. | 2.1 |
1998-11-18 | CVE-1999-0781 | KDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables. | 7.2 |
1998-11-18 | CVE-1999-0780 | KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file. | 4.6 |
1998-06-30 | CVE-1999-1441 | Unspecified vulnerability in Linux Kernel 2.0.34 Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it. | 2.1 |