Vulnerabilities > Redhat > High

DATE CVE VULNERABILITY TITLE RISK
2001-05-28 CVE-2001-1028 Unspecified vulnerability in Redhat Linux
Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.
local
low complexity
redhat
7.2
2001-03-12 CVE-2001-0128 Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. 7.2
2001-01-09 CVE-2000-1189 Unspecified vulnerability in Redhat Linux
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges.
local
low complexity
redhat
7.2
2001-01-09 CVE-2000-1134 Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. 7.2
2001-01-09 CVE-2000-1125 Unspecified vulnerability in Redhat Linux 6.2/6.2E
restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
local
low complexity
redhat
7.2
2001-01-09 CVE-2000-1095 modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
local
low complexity
immunix conectiva mandrakesoft redhat suse
7.2
2000-12-19 CVE-2000-0934 Unspecified vulnerability in Redhat Linux 5.2
Glint in Red Hat Linux 5.2 allows local users to overwrite arbitrary files and cause a denial of service via a symlink attack.
local
low complexity
redhat
7.2
2000-12-11 CVE-2000-1009 dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
local
low complexity
redhat trustix
7.2
2000-11-14 CVE-2000-0867 Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
local
low complexity
debian mandrakesoft redhat slackware trustix
7.2
2000-10-20 CVE-2000-0751 mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
network
low complexity
netbsd openbsd redhat
7.5