Page 31 of 192 results (0.005 seconds)

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 3

Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/20582 http://archives.neohapsis.com/archives/bugtraq/2001-01/0348.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000374 http://www.redhat.com/support/errata/RHSA-2001-004.html http://www.securityfocus.com/bid/2264 https://exchange.xforce.ibmcloud.com/vulnerabilities/5978 •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 1

Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field. • https://www.exploit-db.com/exploits/20569 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:14.micq.asc http://archives.neohapsis.com/archives/bugtraq/2001-01/0307.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0395.html http://www.debian.org/security/2001/dsa-012 http://www.redhat.com/support/errata/RHSA-2001-005.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5962 •

CVSS: 2.1EPSS: 0%CPEs: 13EXPL: 2

glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files. • https://www.exploit-db.com/exploits/258 https://www.exploit-db.com/exploits/317 http://archives.neohapsis.com/archives/bugtraq/2001-01/0131.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0186.html http://www.redhat.com/support/errata/RHSA-2001-001.html http://www.securityfocus.com/bid/2181 https://exchange.xforce.ibmcloud.com/vulnerabilities/5907 •

CVSS: 2.1EPSS: 0%CPEs: 19EXPL: 1

When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. • https://www.exploit-db.com/exploits/290 http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt http://www.debian.org/security/2001/dsa-039 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2 http://www.novell.com/linux/security/advisories/2001_001_glibc_txt.html http://www.redhat.com/support/errata/RHSA-2001-002.html http://www.securityfocus.com/archive&#x •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 0

Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:06.zope.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000365 http://www.debian.org/security/2000/20001219 http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-083.php3 http://www.osvdb.org/6284 http://www.redhat.com/support/errata/RHSA-2000-127.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5777 •