Page 32 of 192 results (0.012 seconds)

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000358 http://www.linux-mandrake.com/en/security/MDKSA-2000-082.php3 http://www.redhat.com/support/errata/RHSA-2000-120.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5747 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 2

modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/20402 http://archives.neohapsis.com/archives/bugtraq/2000-11/0179.html http://archives.neohapsis.com/archives/linux/suse/2000-q4/0596.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000340 http://www.debian.org/security/2000/20001120 http://www.linux-mandrake.com/en/security/MDKSA-2000-071-1.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA-2000-108.html http://www.securityfocus.com/bid/1936 https://exchange.xf •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 3

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. • https://www.exploit-db.com/exploits/217 https://www.exploit-db.com/exploits/20436 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350 http://distro.conectiva.com.br/atualizacoes/?id=a& •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 4

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. • https://www.exploit-db.com/exploits/20385 https://www.exploit-db.com/exploits/184 https://www.exploit-db.com/exploits/182 http://marc.info/?l=bugtraq&m=97336034309944&w=2 http://www.securityfocus.com/bid/1914 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. • https://www.exploit-db.com/exploits/206 https://www.exploit-db.com/exploits/193 http://archives.neohapsis.com/archives/bugtraq/2000-10/0438.html http://www.securityfocus.com/bid/1871 https://exchange.xforce.ibmcloud.com/vulnerabilities/5437 •