Page 4 of 41 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0246.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000385 http://marc.info/?l=bugtraq&m=98473109630421&w=2 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-031.php3 http://www.osvdb.org/5615 http://www.redhat.com/support/errata/RHSA-2001-029.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6235 •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 0

sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000390 http://marc.info/?l=bugtraq&m=98477491130367&w=2 http://www.debian.org/security/2001/dsa-038 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-030.php3 http://www.novell.com/linux/security/advisories/2001_016_sgmltool_txt.html http://www.redhat.com/support/errata/RHSA-2001-027.html http://www.securityfocus.com/bid/2506 http://www.securityfocus.com/bid/2683 https://exchange.xforce.ibmcloud.com/ •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header. • http://archives.neohapsis.com/archives/freebsd/2001-04/0610.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000383 http://marc.info/?l=bugtraq&m=98471253131191&w=2 http://www.debian.org/security/2001/dsa-040 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-028.php3 http://www.redhat.com/support/errata/RHSA-2001-028.html http://www.securityfocus.com/bid/2493 https://exchange.xforce.ibmcloud.com/vulnerabilities/6213 •

CVSS: 2.1EPSS: 0%CPEs: 13EXPL: 0

kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges. • http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-018.php3?dis=7.2 http://www.novell.com/linux/security/advisories/2001_002_kdesu_txt.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5995 •

CVSS: 2.1EPSS: 0%CPEs: 19EXPL: 1

When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. • https://www.exploit-db.com/exploits/290 http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt http://www.debian.org/security/2001/dsa-039 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2 http://www.novell.com/linux/security/advisories/2001_001_glibc_txt.html http://www.redhat.com/support/errata/RHSA-2001-002.html http://www.securityfocus.com/archive&#x •