Page 1035 of 5206 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

mknod in Linux 2.2 follows symbolic links, which could allow local users to overwrite files or gain privileges. • http://marc.info/?l=bugtraq&m=93855134409747&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users. • https://www.exploit-db.com/exploits/19467 http://www.securityfocus.com/bid/597 http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000%40nimue.ids.pl •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets. • https://www.exploit-db.com/exploits/19301 http://marc.info/?l=bugtraq&m=93312523904591&w=2 http://www.securityfocus.com/bid/543 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory. • https://www.exploit-db.com/exploits/19419 http://www.securityfocus.com/archive/1/18156 http://www.securityfocus.com/bid/523 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service. • http://marc.info/?l=bugtraq&m=93220073515880&w=2 •