| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| fte-console in the fte package before 0.46b-4.1 does not drop root privileges, which allows local users to gain root access via the virtual console device. |
| Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory. |
| The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option. |
| KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file. |
| The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users. |
| The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. |
| The rwho/rwhod service is running, which exposes machine status and user information. |
| Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. |
| Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service. |
| In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection. |
| A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files. |
| Denial of service in Linux 2.2.0 running the ldd command on a core file. |
| super 3.11.6 and other versions have a buffer overflow in the syslog utility which allows a local user to gain root access. |
| Buffer overflow in Linux su command gives root access to local users. |
| Nestea variation of teardrop IP fragmentation denial of service. |
| Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". |
| Denial of service of inetd on Linux through SYN and RST packets. |
| Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. |
| Linux implementations of TFTP would allow access to files outside the restricted directory. |
| Denial of service in syslog by sending it a large number of superfluous messages. |