Page 30 of 337 results (0.007 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

04 Oct 1999 — RPMMail before 1.4 allows remote attackers to execute commands via an e-mail message with shell metacharacters in the "MAIL FROM" command. • http://marc.info/?l=bugtraq&m=93915641729415&w=2 •

CVSS: 9.8EPSS: 1%CPEs: 10EXPL: 2

16 Sep 1999 — Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. • https://www.exploit-db.com/exploits/19478 •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 1

01 Sep 1999 — Buffer overflow in INN inews program. • https://www.exploit-db.com/exploits/19480 •

CVSS: 9.8EPSS: 1%CPEs: 5EXPL: 2

25 Aug 1999 — Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable. • https://www.exploit-db.com/exploits/19470 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 1

25 Aug 1999 — Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. • https://www.exploit-db.com/exploits/19474 •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

25 Aug 1999 — Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

21 Aug 1999 — pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files. • http://www.novell.com/linux/security/advisories/suse_security_announce_21.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

19 Aug 1999 — Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable. • http://www.securityfocus.com/bid/594 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

11 Aug 1999 — Red Hat pump DHCP client allows remote attackers to gain root access in some configurations. • http://www.redhat.com/support/errata/RHSA-1999-027.html •

CVSS: 9.1EPSS: 6%CPEs: 2EXPL: 1

25 Jul 1999 — The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. • https://www.exploit-db.com/exploits/20465 •