Page 27 of 328 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 1

22 Mar 2000 — gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. • https://www.exploit-db.com/exploits/19816 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

02 Mar 2000 — The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

28 Feb 2000 — Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument. • http://www.redhat.com/support/errata/RHSA-2000-100.html •

CVSS: 9.8EPSS: 0%CPEs: 14EXPL: 0

28 Feb 2000 — Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message. • http://www.redhat.com/support/errata/RHSA-2000-006.html •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 4

26 Feb 2000 — Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. • https://www.exploit-db.com/exploits/255 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

24 Feb 2000 — buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters. • https://www.exploit-db.com/exploits/19764 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

24 Feb 2000 — setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file. • https://www.exploit-db.com/exploits/19765 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

23 Feb 2000 — Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt. • https://www.exploit-db.com/exploits/19763 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

12 Jan 2000 — get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. • https://www.exploit-db.com/exploits/19723 •

CVSS: 10.0EPSS: 1%CPEs: 32EXPL: 1

08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 •