Page 47 of 289 results (0.014 seconds)

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 0

Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:06.zope.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000365 http://www.debian.org/security/2000/20001219 http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-083.php3 http://www.osvdb.org/6284 http://www.redhat.com/support/errata/RHSA-2000-127.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5777 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7574 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7575 •

CVSS: 1.2EPSS: 0%CPEs: 8EXPL: 0

exmh 2.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the exmhErrorMsg temporary file. • http://archives.neohapsis.com/archives/freebsd/2001-01/0543.html http://marc.info/?l=bugtraq&m=97846489313059&w=2 http://marc.info/?l=bugtraq&m=97958594330100&w=2 http://www.beedub.com/exmh/symlink.html http://www.debian.org/security/2001/dsa-022 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-015.php3 https://exchange.xforce.ibmcloud.com/vulnerabilities/5829 •

CVSS: 5.0EPSS: 4%CPEs: 4EXPL: 5

Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed. • https://www.exploit-db.com/exploits/244 https://www.exploit-db.com/exploits/241 https://www.exploit-db.com/exploits/20536 http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000380 http://www.debian.org/security/2001/dsa-029 http://www.linux-mandrake.com/en/security/2001 • CWE-401: Missing Release of Memory after Effective Lifetime •