Page 49 of 322 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call. Vulnerabilidad de cadena de formato en la función startprinting() de printjob.c en el paquete lpr lpd basado en BSD puede permitir a usuarios locales ganar privilegios mediante una llamada impropia a syslog que usa cadenas de formato de la llamada checkremote(). • http://marc.info/?l=bugtraq&m=96994604300675&w=2 http://online.securityfocus.com/archive/1/137555 http://www.iss.net/security_center/static/5286.php http://www.redhat.com/support/errata/RHSA-2000-066.html http://www.securityfocus.com/bid/1711 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

ktrace in BSD-based operating systems allows the owner of a process with special privileges to trace the process after its privileges have been lowered, which may allow the owner to obtain sensitive information that the process obtained while it was running with the extra privileges. ktrace en sistemas opertativos basados en BSD permite al propietario de un proceso con privilegios especiales trazar el proceso después de que sus privilegios han sido bajados, lo que puede permitir al propietario obtener información sensible que el proceso obtuviera mientras corría con privilegios extra. • http://marc.info/?l=bugtraq&m=102650797504351&w=2 http://www.iss.net/security_center/static/9474.php http://www.openbsd.org/errata.html#ktrace http://www.securityfocus.com/bid/5133 •

CVSS: 10.0EPSS: 55%CPEs: 26EXPL: 2

Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt). • https://www.exploit-db.com/exploits/21579 https://www.exploit-db.com/exploits/21578 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 http://marc.info/?l=bugtraq&m=102514371522793&w=2 http://marc.info/?l=bugtraq&m=102514631524575&w=2 http://marc.info/?l=bugtraq&m=102521542826833&w=2 http://marc.info/? •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

mail in OpenBSD 2.9 and 3.0 processes a tilde (~) escape character in a message even when it is not in interactive mode, which could allow local users to gain root privileges via calls to mail in cron. • https://www.exploit-db.com/exploits/21373 http://marc.info/?l=bugtraq&m=101855467811695&w=2 http://online.securityfocus.com/archive/1/267089 http://www.iss.net/security_center/static/8818.php http://www.openbsd.org/errata30.html#mail http://www.osvdb.org/5269 http://www.securityfocus.com/bid/4495 •

CVSS: 10.0EPSS: 28%CPEs: 1EXPL: 3

Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 http://marc.info/?l=bugtraq&m=102514371522793&w=2 http://marc.info/?l=bugtraq&m=102514631524575&w=2 http://marc.info/?l=bugtraq&m=102521542826833&w=2 http://www.cert.org/advisories/CA-2002-18.html http://www.debian.org/security/2002/dsa-134 http://www.iss.net/ • CWE-190: Integer Overflow or Wraparound •