5 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

06 Nov 2019 — linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code. Linux vserver versiones 2.6 anteriores a 2.6.17, sufre de escalada de privilegios en el código remount. • https://security-tracker.debian.org/tracker/CVE-2006-4243 • CWE-269: Improper Privilege Management •

CVSS: 9.1EPSS: 0%CPEs: 280EXPL: 0

16 Feb 2005 — Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVSS: 7.1EPSS: 0%CPEs: 19EXPL: 0

31 Dec 2004 — Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server. • http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 2

31 Dec 2004 — Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to "write access to specific proc entries from a vserver context", a different vulnerability than CVE-2004-2408. • http://linux-vserver.org/ChangeLog •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 2

06 Feb 2004 — Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command. • https://www.exploit-db.com/exploits/23658 •