Page 31 of 194 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1558 •

CVSS: 7.5EPSS: 9%CPEs: 9EXPL: 1

mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/26630 http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1559 •

CVSS: 5.0EPSS: 0%CPEs: 17EXPL: 2

pam_console PAM module in Linux systems allows a user to access the system console and reboot the system when a display manager such as gdm or kdm has XDMCP enabled. • https://www.exploit-db.com/exploits/20105 http://archives.neohapsis.com/archives/bugtraq/2000-07/0398.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0455.html http://www.redhat.com/support/errata/RHSA-2000-044.html http://www.securityfocus.com/bid/1513 https://exchange.xforce.ibmcloud.com/vulnerabilities/5001 •

CVSS: 2.1EPSS: 0%CPEs: 18EXPL: 0

Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0251.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0117.html http://www.redhat.com/support/errata/RHSA-2000-053.html http://www.securityfocus.com/bid/1489 https://exchange.xforce.ibmcloud.com/vulnerabilities/4944 •

CVSS: 10.0EPSS: 8%CPEs: 32EXPL: 5

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •