Page 20 of 118 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 2

IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html http://www.novell.com/linux/security/advisories/suse_security_announce_48.html http://www.securityfocus.com/bid/1078 •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. • https://www.exploit-db.com/exploits/19816 http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html http://www.novell.com/linux/security/advisories/suse_security_announce_45.html http://www.redhat.com/support/errata/RHSA-2000-009.html http://www.redhat.com/support/errata/RHSA-2000-045.html http://www.securityfocus.com/bid/1069 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

The default installation of Debian GNU/Linux uses an insecure Master Boot Record (MBR) which allows a local user to boot from a floppy disk during the installation. • http://marc.info/?l=bugtraq&m=94973075614088&w=2 http://www.securityfocus.com/bid/960 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Linux apcd program allows local attackers to modify arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19735 http://www.debian.org/security/2000/20000201 http://www.securityfocus.com/bid/958 •

CVSS: 10.0EPSS: 2%CPEs: 31EXPL: 1

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://rhn.redhat.com/errata/RHSA-2000-002.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/30308 http://www.l0pht.com/advisories/lpd_advisory http://www.securityfocus.com/bid/927 https://exchange.xforce.ibmcloud.com/vulnerabilities/3840 •