Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2016-6325

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-13 Oct, 2016 | 14:00
Updated At-06 Aug, 2024 | 01:29
Rejected At-
Credits

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:13 Oct, 2016 | 14:00
Updated At:06 Aug, 2024 | 01:29
Rejected At:
▼CVE Numbering Authority (CNA)

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/93478
vdb-entry
x_refsource_BID
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2016-2045.html
vendor-advisory
x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2016-2046.html
vendor-advisory
x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2017-0457.html
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2017:0455
vendor-advisory
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2017:0456
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/bid/93478
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2045.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2046.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://rhn.redhat.com/errata/RHSA-2017-0457.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0455
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1367447
Resource:
x_refsource_CONFIRM
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0456
Resource:
vendor-advisory
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/93478
vdb-entry
x_refsource_BID
x_transferred
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
x_refsource_CONFIRM
x_transferred
http://rhn.redhat.com/errata/RHSA-2016-2045.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://rhn.redhat.com/errata/RHSA-2016-2046.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://rhn.redhat.com/errata/RHSA-2017-0457.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2017:0455
vendor-advisory
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
x_refsource_CONFIRM
x_transferred
https://access.redhat.com/errata/RHSA-2017:0456
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/bid/93478
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2045.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2046.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2017-0457.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0455
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1367447
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0456
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:13 Oct, 2016 | 14:59
Updated At:12 Apr, 2025 | 10:46

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

The Apache Software Foundation
apache
>>tomcat>>-
cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_enterprise_web_server>>2.0.0
cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_web_server>>3.0
cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5.0
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>6.0
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>7.0
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_hpc_node>>6.0
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_hpc_node>>7.0
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_hpc_node_eus>>7.2
cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>7.2
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_eus>>7.2
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://rhn.redhat.com/errata/RHSA-2016-2045.htmlsecalert@redhat.com
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2046.htmlsecalert@redhat.com
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2017-0457.htmlsecalert@redhat.com
N/A
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/93478secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2017:0455secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2017:0456secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1367447secalert@redhat.com
Issue Tracking
VDB Entry
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2045.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2046.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2017-0457.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/93478af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2017:0455af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2017:0456af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1367447af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
VDB Entry
Vendor Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2045.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2046.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2017-0457.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/93478
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0455
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0456
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1367447
Source: secalert@redhat.com
Resource:
Issue Tracking
VDB Entry
Vendor Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2045.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2016-2046.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2017-0457.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/93478
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0455
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2017:0456
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1367447
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
VDB Entry
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

232Records found

CVE-2021-38160
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.11%
||
7 Day CHG~0.00%
Published-07 Aug, 2021 | 03:31
Updated-05 May, 2025 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-debian_linuxhci_management_nodelinux_kernelhci_bootstrap_oshci_compute_nodeelement_softwarehci_storage_nodeenterprise_linuxsolidfiren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2002-0839
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.14% / 34.19%
||
7 Day CHG~0.00%
Published-05 Oct, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.

Action-Not Available
Vendor-n/aDebian GNU/LinuxThe Apache Software Foundation
Product-debian_linuxhttp_servern/a
CVE-2002-0506
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.23% / 45.51%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and earlier may allow attackers to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2002-0004
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.27% / 50.52%
||
7 Day CHG~0.00%
Published-25 Jun, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.

Action-Not Available
Vendor-n/aFreeBSD FoundationRed Hat, Inc.Mandriva (Mandrakesoft)SUSENetBSDSlackwareThe MITRE Corporation (Caldera)Debian GNU/Linux
Product-openlinux_servernetbsdsuse_linuxdebian_linuxfreebsdlinuxslackware_linuxopenlinux_workstationmandrake_linuxn/a
CVE-2002-0062
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.20% / 42.60%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."

Action-Not Available
Vendor-n/aSUSEDebian GNU/LinuxRed Hat, Inc.FreeBSD FoundationGNU
Product-suse_linuxdebian_linuxncursesfreebsdlinuxn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2001-0923
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 21.00%
||
7 Day CHG~0.00%
Published-02 Feb, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RPM Package Manager 4.0.x through 4.0.2.x allows an attacker to execute arbitrary code via corrupted data in the RPM file when the file is queried.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-redhat_package_managern/a
CVE-2001-1028
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 39.84%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2019-0211
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.8||HIGH
EPSS-86.24% / 99.36%
||
7 Day CHG~0.00%
Published-08 Apr, 2019 | 21:31
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Action-Not Available
Vendor-The Apache Software FoundationOracle CorporationFedora ProjectNetApp, Inc.Red Hat, Inc.openSUSECanonical Ltd.Debian GNU/Linux
Product-openshift_container_platform_for_poweropenshift_container_platformenterprise_linuxenterprise_linux_update_services_for_sap_solutionscommunications_session_route_managerjboss_core_servicesubuntu_linuxdebian_linuxenterprise_linux_for_arm_64_eusenterprise_manager_ops_centerfedoraenterprise_linux_for_ibm_z_systems_eusleapsoftware_collectionsenterprise_linux_for_power_little_endianenterprise_linux_eusenterprise_linux_for_ibm_z_systemsenterprise_linux_server_ausenterprise_linux_for_arm_64instantis_enterprisetrackcommunications_session_report_managerhttp_serverretail_xstore_point_of_serviceenterprise_linux_for_power_little_endian_eusoncommand_unified_managerenterprise_linux_server_tusApache HTTP ServerHTTP Server
CWE ID-CWE-416
Use After Free
CVE-2001-0872
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.21% / 43.10%
||
7 Day CHG~0.00%
Published-25 Jun, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.

Action-Not Available
Vendor-n/aOpenBSDRed Hat, Inc.SUSE
Product-linuxsuse_linuxopensshn/a
CVE-2018-9568
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.48% / 64.01%
||
7 Day CHG~0.00%
Published-06 Dec, 2018 | 14:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

Action-Not Available
Vendor-Google LLCLinux Kernel Organization, IncCanonical Ltd.Red Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxlinux_kernelenterprise_linux_server_eusandroidenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopAndroid
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2000-0934
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 14.93%
||
7 Day CHG~0.00%
Published-22 Jan, 2001 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Glint in Red Hat Linux 5.2 allows local users to overwrite arbitrary files and cause a denial of service via a symlink attack.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2000-1134
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 39.54%
||
7 Day CHG~0.00%
Published-19 Dec, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

Action-Not Available
Vendor-conectivaimmunixn/aThe MITRE Corporation (Caldera)HP Inc.SUSERed Hat, Inc.Mandriva (Mandrakesoft)
Product-hp-uximmunixsuse_linuxlinuxopenlinux_edesktopopenlinux_eserveropenlinuxmandrake_linuxn/a
CVE-2000-1189
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 14.88%
||
7 Day CHG~0.00%
Published-22 Jan, 2001 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2000-1095
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.21% / 43.61%
||
7 Day CHG~0.00%
Published-22 Jan, 2001 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.

Action-Not Available
Vendor-conectivaimmunixn/aRed Hat, Inc.SUSEMandriva (Mandrakesoft)
Product-linuximmunixsuse_linuxmandrake_linuxn/a
CVE-2001-0128
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.15%
||
7 Day CHG~0.00%
Published-07 May, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.

Action-Not Available
Vendor-conectivazopen/aDebian GNU/LinuxRed Hat, Inc.FreeBSD FoundationMandriva (Mandrakesoft)
Product-linux_powertoolszopedebian_linuxfreebsdlinuxmandrake_linuxn/a
CVE-2016-4805
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.85%
||
7 Day CHG~0.00%
Published-23 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.

Action-Not Available
Vendor-n/aOracle CorporationLinux Kernel Organization, IncRed Hat, Inc.NovellCanonical Ltd.
Product-suse_linux_enterprise_real_time_extensionsuse_linux_enterprise_workstation_extensionenterprise_linuxopensuse_leaplinux_kernelsuse_linux_enterprise_live_patchingubuntu_linuxsuse_linux_enterprise_serversuse_linux_enterprise_desktopsuse_linux_enterprise_module_for_public_cloudlinuxsuse_linux_enterprise_software_development_kitn/a
CWE ID-CWE-416
Use After Free
CVE-2000-0052
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.31% / 53.63%
||
7 Day CHG~0.00%
Published-18 Apr, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.

Action-Not Available
Vendor-turbolinuxn/aRed Hat, Inc.Mandriva (Mandrakesoft)
Product-linuxturbolinuxmandrake_linuxn/a
CVE-2000-0566
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 24.94%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

makewhatis in Linux man package allows local users to overwrite files via a symlink attack.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)Red Hat, Inc.Mandriva (Mandrakesoft)
Product-linuxopenlinuxmandrake_linuxn/a
CVE-2000-0219
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.42% / 60.84%
||
7 Day CHG~0.00%
Published-22 Mar, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2000-0392
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 30.77%
||
7 Day CHG~0.00%
Published-12 Jul, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.

Action-Not Available
Vendor-cygnusn/aRed Hat, Inc.MIT (Massachusetts Institute of Technology)
Product-cygnus_network_securitykerberoslinuxkerbnetkerberos_5n/a
CVE-2000-0607
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 30.13%
||
7 Day CHG~0.00%
Published-19 Jul, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.Mandriva (Mandrakesoft)
Product-linuxdebian_linuxmandrake_linuxn/a
CVE-2000-0606
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 19.75%
||
7 Day CHG~0.00%
Published-19 Jul, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.Mandriva (Mandrakesoft)
Product-linuxdebian_linuxmandrake_linuxn/a
CVE-1999-1491
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.12% / 31.02%
||
7 Day CHG~0.00%
Published-12 Sep, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2000-0229
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 30.46%
||
7 Day CHG~0.00%
Published-02 Jun, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.

Action-Not Available
Vendor-alessandro_rubinin/aDebian GNU/LinuxRed Hat, Inc.SUSE
Product-linuxsuse_linuxdebian_linuxgpmn/a
CVE-1999-1327
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 20.15%
||
7 Day CHG~0.00%
Published-09 Mar, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in linuxconf 1.11r11-rh2 on Red Hat Linux 5.1 allows local users to gain root privileges via a long LANG environmental variable.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2000-0118
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.82%
||
7 Day CHG~0.00%
Published-08 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.

Action-Not Available
Vendor-n/aRed Hat, Inc.Sun Microsystems (Oracle Corporation)
Product-solarislinuxsunosn/a
CVE-2000-0186
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 19.75%
||
7 Day CHG~0.00%
Published-10 Apr, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.

Action-Not Available
Vendor-turbolinuxn/aRed Hat, Inc.FreeBSD FoundationMandriva (Mandrakesoft)
Product-linuxturbolinuxfreebsdmandrake_linuxn/a
CVE-2000-0230
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.12% / 31.20%
||
7 Day CHG~0.00%
Published-02 Jun, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable.

Action-Not Available
Vendor-halloweenn/aRed Hat, Inc.
Product-linuxhalloween_linuxn/a
CVE-1999-1490
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.13% / 33.61%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-1999-1328
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 19.04%
||
7 Day CHG~0.00%
Published-09 Mar, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

linuxconf before 1.11.r11-rh3 on Red Hat Linux 5.1 allows local users to overwrite arbitrary files and gain root access via a symlink attack.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2000-0378
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.42% / 60.87%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-1999-1182
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 21.32%
||
7 Day CHG~0.00%
Published-12 Sep, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.

Action-Not Available
Vendor-lstdelixn/aSUSEThe MITRE Corporation (Caldera)Red Hat, Inc.Debian GNU/Linux
Product-lst_power_linuxdldopenlinux_litesuse_linuxdebian_linuxlinuxn/a
CVE-1999-0872
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 19.75%
||
7 Day CHG~0.00%
Published-04 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.

Action-Not Available
Vendor-paul_vixien/aThe MITRE Corporation (Caldera)Red Hat, Inc.Debian GNU/Linux
Product-vixie_cronlinuxopenlinuxdebian_linuxn/a
CVE-1999-0318
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 30.88%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.

Action-Not Available
Vendor-n/aIBM CorporationRed Hat, Inc.Sun Microsystems (Oracle Corporation)HP Inc.
Product-hp-uxaixsolarissunoslinuxn/a
CVE-1999-0130
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.89% / 74.49%
||
7 Day CHG~0.00%
Published-29 Sep, 1999 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local users can start Sendmail in daemon mode and gain root privileges.

Action-Not Available
Vendor-eric_allmanbsdin/aThe MITRE Corporation (Caldera)HP Inc.IBM CorporationFreeBSD FoundationRed Hat, Inc.
Product-sendmailbsd_oshp-uxaixfreebsdlinuxnetwork_desktopn/a
CVE-1999-0131
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.10% / 27.62%
||
7 Day CHG~0.00%
Published-29 Sep, 1999 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.

Action-Not Available
Vendor-digitaleric_allmanbsdiscon/aIBM CorporationRed Hat, Inc.FreeBSD FoundationHP Inc.
Product-sendmailbsd_osinternet_faststarthp-uxaixopenserverfreebsdosf_1linuxn/a
CVE-2018-8781
Matching Score-8
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-8
Assigner-Check Point Software Ltd.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.46%
||
7 Day CHG~0.00%
Published-23 Apr, 2018 | 19:00
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.

Action-Not Available
Vendor-Check Point Software Technologies Ltd.Canonical Ltd.Red Hat, Inc.Debian GNU/LinuxLinux Kernel Organization, Inc
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_workstationenterprise_linux_desktopLinux Kernel
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-1999-0390
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 22.18%
||
7 Day CHG~0.00%
Published-22 Mar, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Dosemu Slang library in Linux.

Action-Not Available
Vendor-n/aSUSERed Hat, Inc.
Product-linuxsuse_linuxn/a
CVE-1999-0769
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.82%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.

Action-Not Available
Vendor-paul_vixien/aThe MITRE Corporation (Caldera)Red Hat, Inc.Debian GNU/Linux
Product-vixie_cronlinuxopenlinuxdebian_linuxn/a
CVE-2019-0155
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.03%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:42
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Intel Corporation
Product-enterprise_linux_server_euspentium_gold_g4600pentium_silver_n5000_firmwareenterprise_linux_server_auscore_i3-9100_firmwarexeon_e3-1558l_v5celeron_j1900_firmwarecore_i5-1035g7xeon_e3-1501l_v6_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarepentium_gold_g5420xeon_e-2124g_firmwarecore_i5-8305g_firmwarecore_i5-7500_firmwarepentium_gold_g5420t_firmwarexeon_e-2254me_firmwarecore_i5-8400hceleron_j1850core_m-5y71_firmwarexeon_e-2276me_firmwarepentium_gold_g5420_firmwarecore_i5-7y54pentium_d1509_firmwareceleron_n2815core_i7-9700core_i7-6650u_firmwarexeon_e-2226gpentium_gold_g5400tpentium_gold_g4560_firmwarecore_i7-5500u_firmwarecore_i5-1035g4core_i3-8145uceleron_n3000_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i9-9940x_firmwarecore_i7-6700tecore_i7-6567u_firmwarexeon_e3-1501l_v6core_i3-8109ucore_i9-7920xcore_i7-7600uxeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarecore_i3-7300core_i9-7940x_firmwarecore_i5-8269u_firmwarexeon_e3-1505l_v6xeon_e-2278gegraphics_drivercore_i5-6287u_firmwarexeon_e-2134_firmwarecore_i5-5350h_firmwarepentium_g4560tcore_m5-6y54celeron_n3150celeron_n4100celeron_n3060core_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i5-5250ucore_i7-10710u_firmwarecore_i7-7820hkpentium_d1517core_i5-9500_firmwarecore_i7-5850hqcore_m-5y10ccore_i9-9940xpentium_gold_g5620xeon_e3-1558l_v5_firmwarecore_i5-8400h_firmwareceleron_n4120core_i7-6970hqcore_i5-8600celeron_g3930texeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-9400_firmwareceleron_n2840pentium_g4600t_firmwarecore_i7-8500y_firmwareceleron_g4930e_firmwarecore_i3-8100celeron_n2930celeron_n2840_firmwarecore_m7-6y75pentium_n3540_firmwareceleron_g4900tcore_i3-7300_firmwarecore_m3-6y30core_m-5y31_firmwarexeon_e3-1535m_v5core_i5-7287u_firmwarecore_i7-7700core_m-5y10celeron_g3900te_firmwarecore_i7-7820hq_firmwarecore_i7-5950hq_firmwarecore_i7-7920hq_firmwareceleron_g4932epentium_d1517_firmwarecore_i5-8600kxeon_e3-1575m_v5_firmwarecore_i7-8700k_firmwarecore_i7-5750hq_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i7-5700hq_firmwareceleron_g3900_firmwarecore_i5-8365uxeon_e3-1501m_v6celeron_j3060core_i9-9960x_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-7100u_firmwareceleron_g4930core_i5-7600core_i3-6100h_firmwarecore_i9-7940xcore_i9-9960xxeon_e-2286mxeon_e3-1505m_v5pentium_gold_g4600_firmwarepentium_n3540pentium_3560mcore_i7-5650uxeon_e-2276gcore_i3-8300xeon_e-2186gcore_i5-7400tcore_i7-5557u_firmwarecore_i5-7267u_firmwarecore_i3-5005ucore_i3-5020uxeon_e-2174gcore_i3-7100core_i7-8809gceleron_j4105celeron_g4932e_firmwarecore_i5-7260ucore_i7-8700bcore_i5-5257ucore_m-5y70core_i7-7500u_firmwareceleron_j1800core_i3-9130u_firmwarecore_i5-7267ucore_i7-7800xcore_i5\+8500core_i5-5300ucore_m-5y10a_firmwarexeon_e3-1585_v5core_i5-10210ycore_i7-7820hk_firmwarecore_i7-6560ucore_i5-9400tceleron_j3355core_i5-10210u_firmwarecore_i7-5550u_firmwarecore_i5-8300hcore_i5-8600t_firmwareatom_x7-e3950core_i3-10110ycore_i3-7300t_firmwarexeon_e3-1535m_v6_firmwareceleron_j3355ecore_i7-5600uceleron_g4930epentium_gold_4410ycore_i9-9900kscore_i5-9600celeron_j4125_firmwarepentium_gold_g5500tpentium_g4400_firmwarexeon_e3-1585l_v5_firmwarepentium_3805u_firmwarepentium_3805ucore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e-2224_firmwareceleron_n3350core_i5-9300h_firmwarecore_i3-6167uceleron_g4920xeon_e-2274gcore_i5-9500core_i3-9320_firmwarepentium_silver_j5005xeon_e-2278gelcore_i5-8400b_firmwarecore_i5-5200ucore_i7-6700t_firmwarecore_i3-8100_firmwareceleron_n2807core_i7-6500upentium_j3710core_i7-6500u_firmwareceleron_g3902exeon_e-2124core_i9-9880hcore_i7-10710ucore_i5-7287ucore_i5-8500t_firmwarecore_i3-7100h_firmwareatom_x5-e3930_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarepentium_n3530xeon_e-2276g_firmwarecore_i5-6300upentium_gold_g4560xeon_e-2276mecore_i7-8565uceleron_n3350_firmwarecore_i9-9980xe_firmwarecore_i5-7300hq_firmwarecore_i3-5015u_firmwarexeon_e-2274g_firmwareceleron_n2820core_i5-7300hqcore_i7-8706g_firmwarecore_i7-7560upentium_gold_g5420tcore_i3-6100hcore_i5-7400t_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259upentium_gold_4415y_firmwarexeon_e3-1535m_v6core_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-5257u_firmwareceleron_n2806pentium_gold_g5500atom_x5-e3940xeon_e-2146g_firmwarecore_i7-5850hq_firmwarecore_i7-8850h_firmwarecore_m7-6y75_firmwarecore_i7-6700hqcore_i3-9130ucore_i9-7900x_firmwarecore_i7-7800x_firmwarecore_i7-9850h_firmwarecore_i5-6350hqpentium_d1519core_i3-7100_firmwarecore_i5-7600tcore_i7-6660u_firmwareenterprise_linux_server_tuscore_i5-6350hq_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2276ml_firmwareubuntu_linuxceleron_n3010xeon_e-2224gcore_i3-9100tceleron_j4025pentium_j4205xeon_e-2226gecore_i7-6650ucore_i9-9900x_firmwarecore_m-5y71core_i5-9300hcore_i3-7167u_firmwarecore_i7-8559u_firmwarecore_i9-10920x_firmwarecore_i7-8086k_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarecore_i3-7167uxeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i7-8500ycore_i5-9400hcore_i7-7567ucore_i9-9900tcore_i7-5557uceleron_g3900e_firmwarecore_i3-8145u_firmwarepentium_4405u_firmwareceleron_n3160_firmwarecore_i7-7660u_firmwarecore_i7-7820hqceleron_n2820_firmwarecore_i5-6260u_firmwarexeon_e3-1585l_v5core_i7-8750h_firmwarecore_i3-5010u_firmwarecore_i3-7300tatom_x7-e3950_firmwarecore_i5-7400_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_n3010_firmwarecore_i7-9700k_firmwarecore_i9-10980xe_firmwarepentium_a1020xeon_e-2288g_firmwareceleron_n4000celeron_n2830core_i5-7y54_firmwarexeon_e-2246g_firmwarepentium_4405y_firmwarecore_i7-6567uxeon_e-2176m_firmwarecore_i7-5775cxeon_e-2174g_firmwareceleron_n3450xeon_e3-1515m_v5core_i9-7900xceleron_n2805_firmwarecore_i9-8950hk_firmwarecore_i5-8500celeron_g3930_firmwarecore_i7-6870hq_firmwarecore_i5-7600_firmwarexeon_e3-1515m_v5_firmwareceleron_n2810core_i5-6267u_firmwarepentium_d1519_firmwareceleron_n2808_firmwarecore_i5-8265ucore_i5-6300hqxeon_e-2254mecore_i7-9750hcore_i5-6440hqcore_i7-7y75core_i3-5157u_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700core_i3-5005u_firmwarecore_i5-7y57celeron_g3920_firmwarecore_i3-8350kcore_i5-7500tpentium_silver_j5040xeon_e3-1505m_v6core_i5-9600k_firmwarecore_i9-9900t_firmwarecore_i3-9100pentium_gold_g5500_firmwarexeon_e-2224g_firmwarepentium_gold_g5600xeon_e3-1578l_v5_firmwareceleron_j4125celeron_g4950_firmwarecore_i9-7920x_firmwarecore_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uceleron_j1750celeron_n2940_firmwarecore_i3-8300tcore_i7-7660ucore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gpentium_g4600txeon_e3-1565l_v5_firmwarepentium_gold_g5620_firmwarepentium_d1508_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarepentium_gold_4415u_firmwarexeon_e-2126g_firmwarecore_i9-7960x_firmwarecore_i7-8700core_i5-8259u_firmwarepentium_j3710_firmwareceleron_g3950core_i5-8400core_i7-8705g_firmwarepentium_3825u_firmwarecore_i3-7100tcore_i7-7700tceleron_n2930_firmwarecore_i7-8086kcore_i5-10210ucore_i5-7260u_firmwarepentium_gold_g5500t_firmwarecore_i7-6600u_firmwarecore_i5-7600k_firmwarecore_i7-6770hqcore_i7-8700kcore_m-5y10aceleron_n2940celeron_n2830_firmwarecore_i5-7200u_firmwarecore_i5-8600k_firmwarecore_i7-10510u_firmwarexeon_e-2134celeron_j3455core_i5-5350hxeon_e-2226g_firmwareceleron_n2807_firmwarepentium_d1509core_i5-10310y_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i7-10510ypentium_g4560t_firmwareceleron_j3160core_i5-7360u_firmwarecore_i3-10110uceleron_n3150_firmwarecore_i9-7960xcore_i5-9600kcore_i7-7820xceleron_g3900core_i5-5287u_firmwarecore_i7-7700hqcore_i9-7980xeceleron_g4900t_firmwarecore_i3-9100t_firmwarecore_i7-6870hqpentium_gold_4415ycore_i5-8350uceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_n4000_firmwarecore_i5-7300ucore_i5-6440hq_firmwarecore_m3-6y30_firmwarexeon_e3-1505l_v6_firmwareceleron_j3455_firmwareceleron_g3930core_i7-5600u_firmwarecore_i5-8500tceleron_g3930t_firmwarexeon_e-2246gcore_i5-7500celeron_n2806_firmwareceleron_n2910pentium_3825uceleron_j1800_firmwarecore_i5\+8400_firmwarecore_i5-5200u_firmwarecore_i5-7200ucore_i5-8350u_firmwarecore_i7-8700b_firmwareceleron_g3930ecore_i9-8950hkxeon_e3-1535m_v5_firmwarepentium_4405ucore_i7-6820hq_firmwarecore_i7-7920hqpentium_gold_g5600_firmwarecore_i9-9900ks_firmwarexeon_e-2254mlxeon_e3-1545m_v5core_i5-8400tcore_i3-9300_firmwarecore_i3-5015uceleron_g3930tpentium_d1508pentium_d1507_firmwarexeon_e3-1501m_v6_firmwarecore_i3-6100_firmwarecore_i9-10920xcore_m-5y51xeon_e-2254ml_firmwareceleron_j4105_firmwarexeon_e3-1578l_v5core_i7-6660ucore_i3-7350k_firmwarecore_i7-5775c_firmwarecore_i7-5500uceleron_g4920_firmwarepentium_3560m_firmwarepentium_silver_n5000core_i5-6500_firmwarecore_i3-7100hcore_i3-9300xeon_e-2276mlceleron_n3350e_firmwarexeon_e-2244gcore_i5\+8400core_i9-9900kxeon_e-2176gpentium_gold_g5400_firmwarecore_i7-8709gcore_i3-5020u_firmwarecore_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-6287ucore_i5-1035g7_firmwarepentium_silver_j5040_firmwareceleron_j4025_firmwareceleron_j1900core_i5-9400core_i9-9920xcore_i3-8100tcore_m3-8100y_firmwarecore_i7-5950hqcore_i5-6260ucore_i7-5650u_firmwarecore_i7-5550uatom_x5-e3930celeron_g4930_firmwarecore_i5-9500txeon_e-2278ge_firmwarecore_i5-7500t_firmwarecore_i7-6820hk_firmwarecore_i7-8700tcore_i7-6820hqceleron_g4930t_firmwarecore_i5-7400core_i7-8650uceleron_n2810_firmwarecore_m3-7y30_firmwarecore_i3-7320xeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i7-9750h_firmwarecore_i3-6167u_firmwarepentium_gold_g4620_firmwarecore_i3-6100uceleron_j1850_firmwarepentium_gold_4415ucore_i7-6700_firmwarexeon_e-2234_firmwarecore_i5-1035g1pentium_silver_n5030core_i5-5250u_firmwarecore_i7-8565u_firmwarexeon_e-2186g_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarecore_i5-8500bcore_i5-7600t_firmwarexeon_e-2124gceleron_n3050core_i5-8269ucore_i9-7980xe_firmwarecore_i5-7440hq_firmwarecore_i5-6300hq_firmwarexeon_e-2288gceleron_n3000core_m-5y10_firmwarexeon_e-2234core_i7-8709g_firmwareceleron_g3930e_firmwarepentium_a1020_firmwarecore_i7-9850hcore_i7-9700t_firmwareatom_x5-e3940_firmwareceleron_n4100_firmwarepentium_silver_j5005_firmwarecore_i7-7820x_firmwareceleron_g3900tpentium_d1507celeron_g3920core_i3-7100ucore_i5-10210y_firmwarecore_i5-5287ucore_i3-7350kcore_m-5y51_firmwarecore_i5-7600kcore_m5-6y57core_i5-8250uxeon_e-2126gcore_i7-6920hq_firmwarecore_i7-9700tcore_i3-7100t_firmwarecore_i5-7360uceleron_n3450_firmwarecore_i5-6500celeron_n2805core_i7-8650u_firmwareceleron_j1750_firmwarecore_i3-5157upentium_n3530_firmwarecore_i5-6200ucore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-6700hq_firmwarecore_m-5y70_firmwarecore_m3-8100ycore_i5-8250u_firmwarexeon_e-2186mcore_i7-7567u_firmwarecore_m-5y10c_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarepentium_gold_g4620celeron_n4120_firmwareceleron_g3902e_firmwarexeon_e-2176mcore_i7-6970hq_firmwarecore_i7-7700hq_firmwareceleron_n3350ecore_i7-6820hkpentium_g4400core_i9-9900xcore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i5-8365u_firmwareceleron_n2808core_i7-6700te_firmwarecore_i3-9300txeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarepentium_silver_n5030_firmwarexeon_e-2278gxeon_e3-1505l_v5core_i9-9980xeceleron_j3160_firmwarecore_i7-8850hceleron_j4005_firmwarecore_i5-8265u_firmwareceleron_j3060_firmwarecore_i5-5350ucore_i9-10900x_firmwarecore_i7-6560u_firmwarecore_i3-8300_firmwareceleron_g4930tceleron_n2920core_i9-9900_firmwarecore_i7-1065g7_firmwarexeon_e3-1505m_v6_firmwarecore_i9-10900xceleron_g3930te_firmwarexeon_e3-1545m_v5_firmwareceleron_n2815_firmwarecore_i5\+8500_firmwarecore_i7\+8700core_i9-10980xecore_i7-5700hqpentium_j4205_firmwarecore_m3-7y30core_i3-9350kcore_i5-8500_firmwareceleron_n4020_firmwarecore_i5-5300u_firmwarecore_i5-6300u_firmwarecore_i7-8809g_firmwareceleron_g4950core_i7-7700t_firmwarecore_i9-9980hk_firmwarepentium_4405ycore_i5-9400h_firmwareceleron_g4900core_i3-5010ucore_i5-8200ypentium_gold_g5400celeron_g3900t_firmwarecore_i3-6100xeon_e3-1505l_v5_firmwarecore_i3-10110u_firmwareceleron_n4020celeron_g4900_firmwarecore_i5-7440hqcore_i5-5350u_firmwarecore_i5-6360ucore_m5-6y54_firmwarexeon_e-2278gel_firmwarexeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwareceleron_g3900ecore_i7-7700_firmwarecore_i7-6770hq_firmwareceleron_g3950_firmwarecore_i7-5750hqcore_i5-6267uceleron_g3900teceleron_j3355_firmwarecore_i3-1005g1celeron_j4005core_i5-9600tcore_m-5y31core_i3-9320core_i9-9920x_firmwarecore_i5-8600tcore_i7-1065g7core_i5-9400t_firmwarecore_i9-9980hkcore_i5-8305gcore_i7-8559uceleron_n2910_firmwarecore_i7-9700_firmwarexeon_e-2146g2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux
CVE-2018-7566
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.73%
||
7 Day CHG~0.00%
Published-30 Mar, 2018 | 21:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxRed Hat, Inc.Oracle CorporationCanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxlinux_enterprise_module_for_public_cloudlinux_enterprise_serverdebian_linuxlinux_kernelenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationcommunications_eagle_application_processorenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-6574
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-33.95% / 96.82%
||
7 Day CHG+0.57%
Published-07 Feb, 2018 | 21:00
Updated-05 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGoRed Hat, Inc.
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausgoenterprise_linux_server_tusn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-2175
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-2.17% / 83.64%
||
7 Day CHG+0.16%
Published-01 Jun, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/Linux
Product-debian_linuxpdfboxn/a
CVE-2016-1238
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.8||HIGH
EPSS-0.39% / 59.16%
||
7 Day CHG~0.00%
Published-02 Aug, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.

Action-Not Available
Vendor-perln/aopenSUSEThe Apache Software FoundationFedora ProjectDebian GNU/Linux
Product-perlspamassassinleapfedoradebian_linuxn/a
CVE-2018-6084
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.31%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 19:00
Updated-05 Aug, 2024 | 05:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via an executable file.

Action-Not Available
Vendor-Google LLCRed Hat, Inc.Apple Inc.Debian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationmacosenterprise_linux_desktopChrome
CWE ID-CWE-20
Improper Input Validation
CVE-2016-1240
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.8||HIGH
EPSS-20.66% / 95.37%
||
7 Day CHG~0.00%
Published-03 Oct, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxtomcatubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2009-4067
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.61% / 68.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 18:01
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linuxlinux_kerneln/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2016-10730
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.95%
||
7 Day CHG~0.00%
Published-24 Oct, 2018 | 21:00
Updated-06 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. Amstar is an Amanda Application API script. It should not be run by users directly. It uses star to backup and restore data. It runs binaries with root permissions when parsing the command line argument --star-path.

Action-Not Available
Vendor-zmandan/aRed Hat, Inc.
Product-amandaenterprise_linuxn/a
CWE ID-CWE-264
Not Available
CVE-2018-5848
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.32%
||
7 Day CHG~0.00%
Published-12 Jun, 2018 | 20:00
Updated-17 Sep, 2024 | 00:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLCDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_serverdebian_linuxandroidenterprise_linux_workstationvirtualization_hostenterprise_linux_desktopAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-8897
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-19.90% / 95.24%
||
7 Day CHG~0.00%
Published-08 May, 2018 | 18:00
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.

Action-Not Available
Vendor-n/aCanonical Ltd.Xen ProjectCitrix (Cloud Software Group, Inc.)Apple Inc.FreeBSD FoundationDebian GNU/LinuxSynology, Inc.Red Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxfreebsddebian_linuxxenserverenterprise_linux_workstationmac_os_xenterprise_virtualization_managerskynasdiskstation_managerxenn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found