Page 10 of 56 results (0.028 seconds)

CVSS: 10.0EPSS: 0%CPEs: 10EXPL: 0

Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters. • http://www.securityfocus.com/archive/1/137890 http://www.securityfocus.com/bid/1764 https://exchange.xforce.ibmcloud.com/vulnerabilities/5344 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters. • http://marc.info/?l=bugtraq&m=97068555106135&w=2 http://www.osvdb.org/6123 https://exchange.xforce.ibmcloud.com/vulnerabilities/5336 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local attackers to gain root privileges. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch http://www.securityfocus.com/bid/1752 https://exchange.xforce.ibmcloud.com/vulnerabilities/5337 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1558 •

CVSS: 7.5EPSS: 9%CPEs: 9EXPL: 1

mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/26630 http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1559 •