Page 18 of 90 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 https://www.exploit-db.com/exploits/209 https://www.exploit-db.com/exploits/215 https://www.exploit-db.com/exploits/249 https://www.exploit-db.com/exploits/20185 https://www.exploit-db.com/exploits/210 https://www.exploit-db.com/exploits/20188 https://www.exploit-db.com/exploits/20186 https://www.exploit-db.com/exploits/197 https://www.exploit-db.com/exploits/20189 https://www.exploit-db.com/exploits/20190 ftp: • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0429.html http://marc.info/?l=bugtraq&m=97208562830613&w=2 http://marc.info/?l=bugtraq&m=97249980727834&w=2 http://www.iss.net/security_center/static/5431.php http://www.redhat.com/support/errata/RHSA-2000-087.html http://www.securityfocus.com/bid/1813 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0429.html http://marc.info/?l=bugtraq&m=97249980727834&w=2 http://www.redhat.com/support/errata/RHSA-2000-087.html •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 1

Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters. • https://www.exploit-db.com/exploits/20285 http://www.linux-mandrake.com/en/security/MDKSA-2000-056.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA-2000-080.html http://www.securityfocus.com/bid/1785 http://xforce.iss.net/alerts/advise64.php https://exchange.xforce.ibmcloud.com/vulnerabilities/5320 •

CVSS: 10.0EPSS: 8%CPEs: 32EXPL: 5

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •