CVE-2002-2259
https://notcve.org/view.php?id=CVE-2002-2259
Buffer overflow in the French documentation patch for Gnuplot 3.7 in SuSE Linux before 8.0 allows local users to execute arbitrary code as root via unknown attack vectors. • http://www.securityfocus.com/bid/6329 http://www.suse.com/de/security/2002_047_openldap2.html https://exchange.xforce.ibmcloud.com/vulnerabilities/10801 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2002-1285
https://notcve.org/view.php?id=CVE-2002-1285
runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments. runlpr en el paquete LPRng permite al usuario lp local ganar privilegios de root mediante ciertos argumentos de línea de comandos. • http://www.iss.net/security_center/static/10525.php http://www.novell.com/linux/security/advisories/2002_040_lprng_html2ps.html http://www.securityfocus.com/bid/6077 •
CVE-2002-0854
https://notcve.org/view.php?id=CVE-2002-0854
Buffer overflows in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the i4l package on SuSE 7.3, 8.0, and possibly other operating systems, may allow local users to gain privileges. Desbordamiento de búfer en el demonio (daemon) ISDN Point to Point Protocol (PPP) del paquete i4l de SuSE 7.3, 8.0, y posiblemente otros sistemas operativos, podrían permitir a usuarios locales, la obtención de privilegios. • https://lists.opensuse.org/opensuse-security-announce/2002-08/msg00006.html •
CVE-2002-0768
https://notcve.org/view.php?id=CVE-2002-0768
Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command. • http://www.iss.net/security_center/static/9130.php http://www.novell.com/linux/security/advisories/2002_18_lukemftp.html •
CVE-2002-0083 – OpenSSH 2.x/3.0.1/3.0.2 - Channel Code Off-by-One
https://notcve.org/view.php?id=CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. Error 'off-by-one' en el código de canal de OpenSSH 2.0 a 3.0.2 permite a usuarios locales o a servidores remotos ganar privilegios. • https://www.exploit-db.com/exploits/21314 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html http://archives.neohapsis.com/archives/vulnw • CWE-193: Off-by-one Error •