Page 10 of 50 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. • http://marc.info/?l=bugtraq&m=87619953510834&w=2 http://marc.info/?l=bugtraq&m=88886870129518&w=2 http://marc.info/?l=bugtraq&m=88890116304676&w=2 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. • http://marc.info/?l=bugtraq&m=87602661419318&w=2 http://marc.info/?l=bugtraq&m=87602661419351&w=2 http://marc.info/?l=bugtraq&m=88661732807795&w=2 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 4

Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. • https://www.exploit-db.com/exploits/200 https://www.exploit-db.com/exploits/320 https://www.exploit-db.com/exploits/19546 https://www.exploit-db.com/exploits/19547 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0034 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN. • https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •