| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| KDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables. |
| KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file. |
| The rwho/rwhod service is running, which exposes machine status and user information. |
| A system does not present an appropriate legal message or warning to a user who is accessing it. |
| ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. |
| Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. |
| Buffer overflow in Linux autofs module through long directory names allows local users to perform a denial of service. |
| Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. |
| Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service. |
| In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection. |
| A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files. |
| Denial of service in Linux 2.2.0 running the ldd command on a core file. |
| super 3.11.6 and other versions have a buffer overflow in the syslog utility which allows a local user to gain root access. |
| Linux bdash game has a buffer overflow that allows local users to gain root access. |
| Buffer overflow in Linux su command gives root access to local users. |
| Nestea variation of teardrop IP fragmentation denial of service. |
| Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". |
| Denial of service of inetd on Linux through SYN and RST packets. |
| Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. |
| Linux implementations of TFTP would allow access to files outside the restricted directory. |