Page 33 of 202 results (0.015 seconds)

CVSS: 10.0EPSS: 8%CPEs: 32EXPL: 5

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter. • http://www.securityfocus.com/bid/1371 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0006192340340.19998-100000%40ferret.lmh.ox.ac.uk •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 1

Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings. • https://www.exploit-db.com/exploits/20024 http://www.securityfocus.com/bid/1371 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0006192340340.19998-100000%40ferret.lmh.ox.ac.uk •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 http://www.securityfocus.com/bid/1030 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168%40jawa.chilli.net.au •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 3

Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. • https://www.exploit-db.com/exploits/255 https://www.exploit-db.com/exploits/19778 https://www.exploit-db.com/exploits/19779 http://www.securityfocus.com/bid/1011 •