1999-10-07 | CVE-1999-1346 | Unspecified vulnerability in Redhat Linux PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file. | 7.5 |
1999-09-16 | CVE-1999-0704 | Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. | 9.3 |
1999-08-25 | CVE-1999-0872 | Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. | 7.2 |
1999-08-25 | CVE-1999-0769 | Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. | 7.2 |
1999-08-25 | CVE-1999-0768 | Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable. | 7.5 |
1999-08-19 | CVE-1999-0740 | Unspecified vulnerability in Redhat Linux 4.2/5.2/6.0 Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable. | 6.4 |
1999-07-25 | CVE-1999-0710 | Unspecified vulnerability in Redhat Linux 5.2/6.0 The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. | 7.5 |
1999-06-30 | CVE-1999-1348 | Unspecified vulnerability in Redhat Linux Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service. | 2.1 |
1999-06-09 | CVE-2000-0118 | The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. | 7.2 |
1999-03-21 | CVE-1999-0433 | XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. | 4.6 |