Page 69 of 495 results (0.009 seconds)

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 1

TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header. • https://www.exploit-db.com/exploits/21141 http://marc.info/?l=bugtraq&m=100498100112191&w=2 http://marc.info/?l=tux-list&m=100584714702328&w=2 http://www.redhat.com/support/errata/RHSA-2001-142.html http://www.securityfocus.com/bid/3506 https://exchange.xforce.ibmcloud.com/vulnerabilities/7464 https://access.redhat.com/security/cve/CVE-2001-0852 https://bugzilla.redhat.com/show_bug.cgi?id=1616626 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions. • http://online.securityfocus.com/advisories/3725 http://www.redhat.com/support/errata/RHSA-2001-148.html http://www.securityfocus.com/bid/3527 https://exchange.xforce.ibmcloud.com/vulnerabilities/7549 •

CVSS: 6.4EPSS: 1%CPEs: 12EXPL: 0

htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000429 http://marc.info/?l=bugtraq&m=100260195401753&w=2 http://sourceforge.net/tracker/index.php?func=detail&aid=458013&group_id=4593&atid=104593 http://www.calderasystems.com/support/security/advisories/CSSA-2001-035.0.txt http://www.debian.org/security/2001/dsa-080 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-083.php3 http://www.novell.com/linux/security/advisories/2001_035_htdig_txt.html http://www •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

apmscript in Apmd in Red Hat 7.2 "Enigma" allows local users to create or change the modification dates of arbitrary files via a symlink attack on the LOW_POWER temporary file, which could be used to cause a denial of service, e.g. by creating /etc/nologin and disabling logins. • http://marc.info/?l=bugtraq&m=100743394701962&w=2 http://www.osvdb.org/5493 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=56389 https://exchange.xforce.ibmcloud.com/vulnerabilities/8268 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 1

LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges. LPRng en Red Hat Linux 7.0 y 7.1 no libera miembros en grupos suplementarios cuando se bajan los privilegios, lo que podría permitir a un usuario local elevar sus privilegios. • https://www.exploit-db.com/exploits/20923 http://www.ciac.org/ciac/bulletins/l-096.shtml http://www.redhat.com/support/errata/RHSA-2001-077.html http://www.securityfocus.com/bid/2865 https://exchange.xforce.ibmcloud.com/vulnerabilities/6703 https://access.redhat.com/security/cve/CVE-2001-0787 https://bugzilla.redhat.com/show_bug.cgi?id=1616618 •