Page 27 of 151 results (0.001 seconds)

CVSS: 10.0EPSS: 2%CPEs: 3EXPL: 0

Buffer overflow in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function. • http://www.linux-mandrake.com/en/security/MDKSA-2000-064.php3?dis=7.1 https://exchange.xforce.ibmcloud.com/vulnerabilities/5730 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The default configuration of the Xsession file in Mandrake Linux 7.1 and 7.0 bypasses the Xauthority access control mechanism with an "xhost + localhost" command, which allows local users to sniff X Windows events and gain privileges. • http://www.linux-mandrake.com/en/security/MDKSA-2000-052.php3 http://www.securityfocus.com/archive/1/136495 http://www.securityfocus.com/bid/1735 https://exchange.xforce.ibmcloud.com/vulnerabilities/5305 •

CVSS: 10.0EPSS: 3%CPEs: 3EXPL: 0

Format string vulnerability in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function. • http://www.linux-mandrake.com/en/security/MDKSA-2000-064.php3?dis=7.1 https://exchange.xforce.ibmcloud.com/vulnerabilities/5731 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 2

The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 sets the /perl/ directory to be browseable, which allows remote attackers to list the contents of that directory. • https://www.exploit-db.com/exploits/20220 http://archives.neohapsis.com/archives/bugtraq/2000-09/0111.html http://www.securityfocus.com/bid/1678 https://exchange.xforce.ibmcloud.com/vulnerabilities/5257 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-032.0.txt http://archives.neohapsis.com/archives/bugtraq/2000-09/0193.html http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:050 http://marc.info/?l=bugtraq&m=97726239017741&w=2 http://www.novell.com/linux/security/advisories/adv9_draht_syslogd_txt.html http://www.osvdb.org/5824 http://www.redhat.com/support/errata/RHSA-2000-061.html http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000 •