Page 12 of 90 results (0.006 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server. Apache with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the. • https://www.exploit-db.com/exploits/21112 http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0083.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0087.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0094.html http://www.securityfocus.com/archive/1/213667 http://www.securityfocus.com/bid/3335 https://exchange.xforce.ibmcloud.com/vulnerabilities/7129 - •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. • https://www.exploit-db.com/exploits/21095 http://marc.info/?l=bugtraq&m=99892644616749&w=2 http://www.redhat.com/support/errata/RHSA-2001-102.html http://www.securityfocus.com/bid/3241 https://exchange.xforce.ibmcloud.com/vulnerabilities/16509 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409 http://www.iss.net/security_center/static/6869.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060 http://www.redhat.com/support/errata/RHSA-2002-148.html http://www.securityfocus.com/bid/3073 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226 •

CVSS: 7.2EPSS: 0%CPEs: 40EXPL: 0

expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060 http://www.redhat.com/support/errata/RHSA-2002-148.html http://www.securityfocus.com/bid/3074 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=22187 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28224 https://exchange.xforce.ibmcloud.com/vulnerabilities/6870 •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0362.html http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-031-01 http://www.calderasystems.com/support/security/advisories/CSSA-2001-029.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-066.php3 http://www.redhat.com/support/errata/RHSA-2001-097.html http://www.securityfocus.com/archive/1/197727 https://exchange.xforce.ibmcloud.com/vulnerabilities/6862 •