Page 33 of 192 results (0.013 seconds)

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 1

Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS. • http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt http://www.securityfocus.com/archive/1/138550 http://www.securityfocus.com/bid/1142 https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-032.0.txt http://archives.neohapsis.com/archives/bugtraq/2000-09/0193.html http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:050 http://marc.info/?l=bugtraq&m=97726239017741&w=2 http://www.novell.com/linux/security/advisories/adv9_draht_syslogd_txt.html http://www.osvdb.org/5824 http://www.redhat.com/support/errata/RHSA-2000-061.html http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000 •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 https://www.exploit-db.com/exploits/209 https://www.exploit-db.com/exploits/215 https://www.exploit-db.com/exploits/249 https://www.exploit-db.com/exploits/20185 https://www.exploit-db.com/exploits/210 https://www.exploit-db.com/exploits/20188 https://www.exploit-db.com/exploits/20186 https://www.exploit-db.com/exploits/197 https://www.exploit-db.com/exploits/20189 https://www.exploit-db.com/exploits/20190 ftp: • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0429.html http://marc.info/?l=bugtraq&m=97208562830613&w=2 http://marc.info/?l=bugtraq&m=97249980727834&w=2 http://www.iss.net/security_center/static/5431.php http://www.redhat.com/support/errata/RHSA-2000-087.html http://www.securityfocus.com/bid/1813 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0429.html http://marc.info/?l=bugtraq&m=97249980727834&w=2 http://www.redhat.com/support/errata/RHSA-2000-087.html •