Page 42 of 211 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 http://www.securityfocus.com/bid/716 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Bash treats any character with a value of 255 as a command separator. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0234 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. • https://www.exploit-db.com/exploits/19279 http://marc.info/?l=bugtraq&m=87602167418994&w=2 http://www.securityfocus.com/bid/354 •