Page 16 of 104 results (0.006 seconds)

CVSS: 3.6EPSS: 0%CPEs: 6EXPL: 2

Vulnerability in gpm in Caldera Linux allows local users to delete arbitrary files or conduct a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0273.html http://www.securityfocus.com/bid/1512 •

CVSS: 5.0EPSS: 0%CPEs: 17EXPL: 2

pam_console PAM module in Linux systems allows a user to access the system console and reboot the system when a display manager such as gdm or kdm has XDMCP enabled. • https://www.exploit-db.com/exploits/20105 http://archives.neohapsis.com/archives/bugtraq/2000-07/0398.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0455.html http://www.redhat.com/support/errata/RHSA-2000-044.html http://www.securityfocus.com/bid/1513 https://exchange.xforce.ibmcloud.com/vulnerabilities/5001 •

CVSS: 2.1EPSS: 0%CPEs: 18EXPL: 0

Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0251.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0117.html http://www.redhat.com/support/errata/RHSA-2000-053.html http://www.securityfocus.com/bid/1489 https://exchange.xforce.ibmcloud.com/vulnerabilities/4944 •

CVSS: 10.0EPSS: 8%CPEs: 32EXPL: 5

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 http://www.securityfocus.com/bid/1030 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168%40jawa.chilli.net.au •