Page 33 of 337 results (0.008 seconds)

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 2

25 Jan 1998 — Buffer overflow in SGI IRIX mailx program. • https://www.exploit-db.com/exploits/19311 •

CVSS: 10.0EPSS: 4%CPEs: 14EXPL: 2

18 Oct 1997 — Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable. • https://www.exploit-db.com/exploits/19464 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

06 Oct 1997 — sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. • http://marc.info/?l=bugtraq&m=87619953510834&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

17 Jul 1997 — Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. • http://marc.info/?l=bugtraq&m=87602661419318&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 4

29 May 1997 — Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. • https://www.exploit-db.com/exploits/200 •

CVSS: 10.0EPSS: 11%CPEs: 8EXPL: 1

07 Apr 1997 — Buffer overflow in University of Washington's implementation of IMAP and POP servers. • https://www.exploit-db.com/exploits/340 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

01 Mar 1997 — Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0318 •

CVSS: 9.8EPSS: 0%CPEs: 9EXPL: 0

20 Feb 1997 — ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN. • https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml •

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 2

13 Feb 1997 — Buffer overflow in NLS (Natural Language Service). • https://www.exploit-db.com/exploits/19551 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

03 Feb 1997 — rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. • http://marc.info/?l=bugtraq&m=87602167420509&w=2 •