Page 18 of 187 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P http://www.kb.cert.org/vuls/id/258632 http://www.osvdb.org/1822 http://www.securityfocus.com/bid/2714 http://xforce.iss.net/alerts/advise76.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6502 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option. • https://www.exploit-db.com/exploits/270 https://www.exploit-db.com/exploits/20804 ftp://patches.sgi.com/support/free/security/advisories/20010701-01-P http://archives.neohapsis.com/archives/bugtraq/2001-04/0475.html http://archives.neohapsis.com/archives/bugtraq/2001-04/0502.html http://www.osvdb.org/8571 http://www.securityfocus.com/bid/2656 https://exchange.xforce.ibmcloud.com/vulnerabilities/6473 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings. • http://www.cert.org/advisories/CA-2001-07.html http://www.nai.com/research/covert/advisories/048.asp http://www.securityfocus.com/bid/2552 https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings. • http://www.cert.org/advisories/CA-2001-07.html http://www.nai.com/research/covert/advisories/048.asp http://www.securityfocus.com/bid/2550 https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 10.0EPSS: 1%CPEs: 51EXPL: 4

Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 https://www.exploit-db.com/exploits/20732 https://www.exploit-db.com/exploits/20733 ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-018.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20010802-01-P http://archives.neohapsis.com/archives/freebsd/2001-04/0466.html http://www.cert.org/advisories/CA-2001-07.html http://www.nai.com/research/covert/advisories/048.asp http://www.securityfocus.com&#x •