Page 20 of 211 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

29 Jul 1998 — dumpreg in Red Hat Linux 5.1 opens /dev/mem with O_RDWR access, which allows local users to cause a denial of service (crash) by redirecting fd 1 (stdout) to the kernel. • http://marc.info/?l=bugtraq&m=90221104526185&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

28 May 1998 — xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable. • https://www.exploit-db.com/exploits/19281 •

CVSS: 10.0EPSS: 9%CPEs: 76EXPL: 2

08 Apr 1998 — Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 •

CVSS: 7.5EPSS: 0%CPEs: 26EXPL: 0

08 Apr 1998 — Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX •

CVSS: 10.0EPSS: 1%CPEs: 26EXPL: 0

08 Apr 1998 — Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

09 Mar 1998 — ifdhcpc-done script for configuring DHCP on Red Hat Linux 5 allows local users to append text to arbitrary files via a symlink attack on the dhcplog file. • http://marc.info/?l=bugtraq&m=88950856416985&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 2

25 Jan 1998 — Buffer overflow in SGI IRIX mailx program. • https://www.exploit-db.com/exploits/19311 •

CVSS: 10.0EPSS: 4%CPEs: 14EXPL: 2

18 Oct 1997 — Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable. • https://www.exploit-db.com/exploits/19464 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

06 Oct 1997 — sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. • http://marc.info/?l=bugtraq&m=87619953510834&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

17 Jul 1997 — Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. • http://marc.info/?l=bugtraq&m=87602661419318&w=2 •