Page 24 of 120 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 7EXPL: 0

Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/147 •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 0

The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0138 •

CVSS: 1.9EPSS: 0%CPEs: 17EXPL: 0

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0078 •

CVSS: 10.0EPSS: 54%CPEs: 10EXPL: 2

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 https://www.exploit-db.com/exploits/20259 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208 •