2001-06-02 | CVE-2001-0309 | Unspecified vulnerability in Redhat Linux 6.2 inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services. | 5.0 |
2001-05-28 | CVE-2001-1028 | Unspecified vulnerability in Redhat Linux Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges. | 7.2 |
2001-03-26 | CVE-2001-0233 | Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field. | 10.0 |
2001-03-26 | CVE-2001-0197 | Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands. | 10.0 |
2001-03-26 | CVE-2001-0169 | When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. | 2.1 |
2001-03-12 | CVE-2001-0128 | Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. | 7.2 |
2001-01-09 | CVE-2000-1189 | Unspecified vulnerability in Redhat Linux Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges. | 7.2 |
2001-01-09 | CVE-2000-1134 | Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. | 7.2 |
2001-01-09 | CVE-2000-1125 | Unspecified vulnerability in Redhat Linux 6.2/6.2E restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. | 7.2 |
2000-12-11 | CVE-2000-1009 | dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. | 7.2 |