Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown
CVE-2000-0438
Disclosure Date: May 22, 2000 (last updated February 22, 2025)
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
0
Attacker Value
Unknown
CVE-1999-0768
Disclosure Date: August 25, 1999 (last updated February 22, 2025)
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.
0
Attacker Value
Unknown
CVE-1999-0746
Disclosure Date: August 16, 1999 (last updated February 22, 2025)
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service.
0
Attacker Value
Unknown
CVE-1999-0433
Disclosure Date: March 21, 1999 (last updated February 22, 2025)
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
0
Attacker Value
Unknown
CVE-1999-0409
Disclosure Date: March 04, 1999 (last updated February 22, 2025)
Buffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access.
0
Attacker Value
Unknown
CVE-1999-0405
Disclosure Date: February 18, 1999 (last updated February 22, 2025)
A buffer overflow in lsof allows local users to obtain root privilege.
0
Attacker Value
Unknown
CVE-1999-0363
Disclosure Date: February 02, 1999 (last updated February 22, 2025)
SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise.
0
Attacker Value
Unknown
CVE-1999-0390
Disclosure Date: January 04, 1999 (last updated February 22, 2025)
Buffer overflow in Dosemu Slang library in Linux.
0
Attacker Value
Unknown
CVE-1999-1182
Disclosure Date: July 17, 1997 (last updated February 22, 2025)
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
0