Page 41 of 202 results (0.011 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. • https://www.exploit-db.com/exploits/19279 http://marc.info/?l=bugtraq&m=87602167418994&w=2 http://www.securityfocus.com/bid/354 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. • http://marc.info/?l=bugtraq&m=87602167418966&w=2 •