Page 12 of 78 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in dsh in dqs 3.2.7 in SuSE Linux 7.0 and earlier, and possibly other operating systems, allows local users to gain privileges via a long first command line argument. • http://archives.neohapsis.com/archives/bugtraq/2001-05/0193.html http://archives.neohapsis.com/archives/bugtraq/2001-05/0195.html http://www.securityfocus.com/bid/2749 https://exchange.xforce.ibmcloud.com/vulnerabilities/6577 •

CVSS: 7.5EPSS: 4%CPEs: 6EXPL: 1

Sdbsearch.cgi in SuSE Linux 6.0-7.2 could allow remote attackers to execute arbitrary commands by uploading a keylist.txt file that contains filenames with shell metacharacters, then causing the file to be searched using a .. in the HTTP referer (from the HTTP_REFERER variable) to point to the directory that contains the keylist.txt file. • https://www.exploit-db.com/exploits/21075 http://www.novell.com/linux/security/advisories/2001_027_sdb_txt.html http://www.securityfocus.com/archive/1/201216 https://exchange.xforce.ibmcloud.com/vulnerabilities/7003 •

CVSS: 10.0EPSS: 0%CPEs: 12EXPL: 0

time server daemon timed allows remote attackers to cause a denial of service via malformed packets. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:28.timed.asc http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-034.php3 http://www.novell.com/linux/security/advisories/2001_007_nkitserv.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6228 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands. • http://www.debian.org/security/2001/dsa-034 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-027.php3 http://www.novell.com/linux/security/advisories/2001_008_eperl.html http://www.securityfocus.com/bid/2464 https://exchange.xforce.ibmcloud.com/vulnerabilities/6198 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 2

Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter. • https://www.exploit-db.com/exploits/20604 http://marc.info/?l=bugtraq&m=98096782126481&w=2 http://www.debian.org/security/2001/dsa-028 http://www.securityfocus.com/bid/2327 https://exchange.xforce.ibmcloud.com/vulnerabilities/6059 •