Page 33 of 328 results (0.007 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

03 Feb 1997 — rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. • http://marc.info/?l=bugtraq&m=87602167420509&w=2 •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

04 Dec 1996 — Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 1

16 Nov 1996 — Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

08 Oct 1996 — Bash treats any character with a value of 255 as a command separator. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0234 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

11 Sep 1996 — Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

02 Feb 1996 — abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. • https://www.exploit-db.com/exploits/19279 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

02 Jan 1996 — rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. • http://marc.info/?l=bugtraq&m=87602167418966&w=2 •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 2

19 Dec 1994 — rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request. • https://www.exploit-db.com/exploits/20025 •