Page 41 of 203 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. • https://www.exploit-db.com/exploits/19279 http://marc.info/?l=bugtraq&m=87602167418994&w=2 http://www.securityfocus.com/bid/354 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. • http://marc.info/?l=bugtraq&m=87602167418966&w=2 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 2

rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request. • https://www.exploit-db.com/exploits/20025 http://archives.neohapsis.com/archives/bugtraq/2000-06/0073.html http://www.securityfocus.com/bid/1372 https://exchange.xforce.ibmcloud.com/vulnerabilities/5050 •