Page 19 of 95 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 1

cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. • http://marc.info/?l=bugtraq&m=110763404701519&w=2 http://secunia.com/advisories/14357 http://secunia.com/advisories/17063 http://secunia.com/advisories/17532 http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf http://www.debian.org/security/2005/dsa-664 http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391 http://www.mandriva.com/security/advisories?name=MDKSA-2005:032 http://www.redhat.com/support/errata/RHSA-2005-073.html http://www.redhat.com/support&# •

CVSS: 7.8EPSS: 0%CPEs: 39EXPL: 0

Local user gains root privileges via buffer overflow in rdist, via expstr() function. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 0

The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0138 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc http://ciac.llnl.gov/ciac/bulletins/g-24.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/7348 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:10.mount_union.asc http://ciac.llnl.gov/ciac/bulletins/g-24.shtml http://www.iss.net/security_center/static/7429.php •