CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1478 | CVE-1999-1498 | Candidate | Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file. | Proposed (20010912) | MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall | Frech> XF:linux-pkgtool-reply-symlink(7347) | View |
1402 | CVE-1999-1422 | Candidate | The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users. | Proposed (20010912) | MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall | Frech> XF:linux-path-execute-commands(7561) | View |
1422 | CVE-1999-1442 | Candidate | Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments. | Proposed (20010912) | MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall | Frech> XF:linux-k6-dos(7340) | View |
998 | CVE-1999-1018 | Candidate | IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets. | Proposed (20010912) | ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(2) Foat, Wall | Frech> XF:linux-ipchains-bypass-filter(6516) | Frech> XF:linux-ipchains-bypass-filter(6516) | View |
1671 | CVE-2000-0093 | Candidate | An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5. | Proposed (20000208) | ACCEPT(2) Baker, Cole | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:linux-initial-password-encryption | View |
Page 138 of 20943, showing 5 records out of 104715 total, starting on record 686, ending on 690