Page 12 of 91 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges. • https://www.exploit-db.com/exploits/20901 http://archives.neohapsis.com/archives/bugtraq/2001-02/0414.html http://archives.neohapsis.com/archives/bugtraq/2001-02/0427.html http://archives.neohapsis.com/archives/bugtraq/2001-02/0437.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000381 http://www.debian.org/security/2001/dsa-031 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-024.php3 http://www.redhat.com/support/errata/RHSA-2001-018.html http: •

CVSS: 1.2EPSS: 0%CPEs: 2EXPL: 0

mandb in the man-db package before 2.3.16-3 allows local users to overwrite arbitrary files via the command line options (1) -u or (2) -c, which do not drop privileges and follow symlinks. • http://online.securityfocus.com/advisories/3307 http://www.debian.org/security/2001/dsa-056 http://www.securityfocus.com/bid/2720 •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 1

Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field. • https://www.exploit-db.com/exploits/20569 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:14.micq.asc http://archives.neohapsis.com/archives/bugtraq/2001-01/0307.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0395.html http://www.debian.org/security/2001/dsa-012 http://www.redhat.com/support/errata/RHSA-2001-005.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5962 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in crontab allows local users to read crontab files of other users by replacing the temporary file that is being edited while crontab is running. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:09.crontab.v1.1.asc http://www.debian.org/security/2001/dsa-024 http://www.securityfocus.com/bid/2332 https://exchange.xforce.ibmcloud.com/vulnerabilities/6225 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

sash before 3.4-4 in Debian GNU/Linux does not properly clone /etc/shadow, which makes it world-readable and could allow local users to gain privileges via password cracking. • http://www.debian.org/security/2001/dsa-015 https://exchange.xforce.ibmcloud.com/vulnerabilities/5994 • CWE-281: Improper Preservation of Permissions •