3 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files. • http://marc.info/?l=bugtraq&m=93268249021561&w=2 http://www.securityfocus.com/archive/1/2478 http://www.securityfocus.com/bid/535 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Perl fingerd program allows arbitrary command execution from remote users. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0150 •

CVSS: 0EPSS: 96%CPEs: 4EXPL: 0

A version of finger is running that exposes valid user information to any entity on the network. • https://www.cve.org/CVERecord?id=CVE-1999-0612 •