Page 11 of 54 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in the FTP client in the Debian GNU/Linux netstd package. • https://www.exploit-db.com/exploits/19256 http://www.securityfocus.com/bid/324 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. • http://marc.info/?l=bugtraq&m=87602661419318&w=2 http://marc.info/?l=bugtraq&m=87602661419351&w=2 http://marc.info/?l=bugtraq&m=88661732807795&w=2 •

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 0%CPEs: 42EXPL: 1

Buffer overflow of rlogin program using TERM environmental variable. • https://www.exploit-db.com/exploits/19203 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •