Page 10 of 66 results (0.008 seconds)

CVSS: 6.4EPSS: 1%CPEs: 12EXPL: 0

htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000429 http://marc.info/?l=bugtraq&m=100260195401753&w=2 http://sourceforge.net/tracker/index.php?func=detail&aid=458013&group_id=4593&atid=104593 http://www.calderasystems.com/support/security/advisories/CSSA-2001-035.0.txt http://www.debian.org/security/2001/dsa-080 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-083.php3 http://www.novell.com/linux/security/advisories/2001_035_htdig_txt.html http://www •

CVSS: 7.5EPSS: 19%CPEs: 4EXPL: 2

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers. • https://www.exploit-db.com/exploits/20900 http://archives.neohapsis.com/archives/bugtraq/2001-06/0041.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000402 http://www.debian.org/security/2001/dsa-058 http://www.redhat.com/support/errata/RHSA-2001-078.html http://www.securityfocus.com/bid/2828 https://exchange.xforce.ibmcloud.com/vulnerabilities/6671 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409 http://www.iss.net/security_center/static/6869.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060 http://www.redhat.com/support/errata/RHSA-2002-148.html http://www.securityfocus.com/bid/3073 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226 •

CVSS: 7.2EPSS: 0%CPEs: 40EXPL: 0

expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060 http://www.redhat.com/support/errata/RHSA-2002-148.html http://www.securityfocus.com/bid/3074 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=22187 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28224 https://exchange.xforce.ibmcloud.com/vulnerabilities/6870 •

CVSS: 7.5EPSS: 5%CPEs: 12EXPL: 1

Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands. • https://www.exploit-db.com/exploits/20646 http://archives.neohapsis.com/archives/freebsd/2001-04/0607.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000389 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-032.php3 http://www.osvdb.org/5601 http://www.redhat.com/support/errata/RHSA-2001-022.html http://www.redhat.com/support/errata/RHSA-2001-023.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6645 •