Page 2 of 9 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 1

login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server. • https://www.exploit-db.com/exploits/19122 http://marc.info/?l=bugtraq&m=90221104525951&w=2 http://www.securityfocus.com/bid/155 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords. • http://marc.info/?l=bugtraq&m=88637951600184&w=2 •

CVSS: 10.0EPSS: 4%CPEs: 14EXPL: 2

Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable. • https://www.exploit-db.com/exploits/19464 https://www.exploit-db.com/exploits/19465 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0192 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. • http://marc.info/?l=bugtraq&m=87619953510834&w=2 http://marc.info/?l=bugtraq&m=88886870129518&w=2 http://marc.info/?l=bugtraq&m=88890116304676&w=2 •