Page 2 of 10 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 42EXPL: 1

Buffer overflow of rlogin program using TERM environmental variable. • https://www.exploit-db.com/exploits/19203 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Sendmail decode alias can be used to overwrite sensitive files. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.6EPSS: 0%CPEs: 29EXPL: 0

Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. • http://www.cert.org/advisories/CA-1996-25.html •

CVSS: 7.8EPSS: 0%CPEs: 39EXPL: 0

Local user gains root privileges via buffer overflow in rdist, via expstr() function. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179 • CWE-121: Stack-based Buffer Overflow •