Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paul vixie vixie cron 3.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0559
crontab in Vixie cron 3.0.1 and previous versions does not properly drop privileges after the failed parsing of a modification operation, which could allow a local malicious user to gain additional privileges when an editor is called to correct the error.
Paul Vixie Vixie Cron
2 EDB exploits
NA
CVE-2000-1096
crontab by Paul Vixie uses predictable file names for a temporary file and does not properly ensure that the file is owned by the user executing the crontab -e command, which allows local users with write access to the crontab spool directory to execute arbitrary commands by crea...
Paul Vixie Vixie Cron 3.0 Pl1
1 EDB exploit
NA
CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
1 EDB exploit
NA
CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Paul Vixie Vixie Cron 3.0 Pl1
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Redhat Linux 5.2
Caldera Openlinux 2.2
Redhat Linux 6.0
Redhat Linux 5.0
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
NA
CVE-1999-0297
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
Paul Vixie Vixie Cron 3.0
Netbsd Netbsd 2.0.4
Redhat Linux
Bsdi Bsd Os 2.1
Freebsd Freebsd 2.1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started