mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.
Max CVSS
7.5
EPSS Score
0.70%
Published
2001-04-11
Updated
2017-07-11
Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument.
Max CVSS
4.6
EPSS Score
0.04%
Published
2001-04-21
Updated
2017-07-11
Alcatel Speed Touch running firmware KHDSAA.108 and KHDSAA.132 through KHDSAA.134 has a TFTP server running without a password, which allows remote attackers to change firmware versions or the device's configurations.
Max CVSS
7.5
EPSS Score
1.57%
Published
2001-04-10
Updated
2017-07-11
The challenge-response authentication of the EXPERT user for Alcatel Speed Touch running firmware KHDSAA.108 and KHDSAA.132 through KHDSAA.134 allows remote attackers to gain privileges by directly computing the response based on information that is provided by the device during login.
Max CVSS
7.5
EPSS Score
1.82%
Published
2001-04-10
Updated
2017-07-11
Alcatel Speed Touch ADSL modem running firmware KHDSAA.108, KHDSAA.132, KHDSBA.133, and KHDSAA.134 has a blank default password, which allows remote attackers to gain unauthorized access.
Max CVSS
7.5
EPSS Score
1.82%
Published
2001-04-10
Updated
2017-07-11
Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock).
Max CVSS
2.1
EPSS Score
0.04%
Published
2001-04-17
Updated
2016-12-08
Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86."
Max CVSS
2.1
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
Masquerading code for Linux kernel before 2.2.19 does not fully check packet lengths in certain cases, which may lead to a vulnerability.
Max CVSS
7.5
EPSS Score
1.30%
Published
2001-04-17
Updated
2016-12-08
The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory.
Max CVSS
2.1
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact.
Max CVSS
3.6
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact.
Max CVSS
3.6
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
Signedness error in (1) getsockopt and (2) setsockopt for Linux kernel before 2.2.19 allows local users to cause a denial of service.
Max CVSS
2.1
EPSS Score
0.04%
Published
2001-04-17
Updated
2016-12-08
Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang).
Max CVSS
2.1
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers.
Max CVSS
2.1
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory.
Max CVSS
5.5
EPSS Score
0.06%
Published
2001-04-17
Updated
2024-02-02
Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages.
Max CVSS
6.2
EPSS Score
0.06%
Published
2001-04-17
Updated
2016-12-08
Internet Explorer 5.0 and 5.5, and Outlook Express 5.0 and 5.5, allow remote attackers to execute scripts when Active Scripting is disabled by including the scripts in XML stylesheets (XSL) that are referenced using an IFRAME tag, possibly due to a vulnerability in Windows Scripting Host (WSH).
Max CVSS
7.5
EPSS Score
3.94%
Published
2001-04-20
Updated
2021-07-23
17 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!