Page 51 of 289 results (0.018 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

CUPS (Common Unix Printing System) 1.04 and earlier allows remote attackers to cause a denial of service by authenticating with a user name that does not exist or does not have a shadow password. • ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch http://archives.neohapsis.com/archives/bugtraq/2000-06/0188.html http://www.securityfocus.com/bid/1373 https://exchange.xforce.ibmcloud.com/vulnerabilities/4846 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter. • http://www.securityfocus.com/bid/1371 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0006192340340.19998-100000%40ferret.lmh.ox.ac.uk •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

CUPS (Common Unix Printing System) 1.04 and earlier does not properly delete request files, which allows a remote attacker to cause a denial of service. • ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch http://archives.neohapsis.com/archives/bugtraq/2000-06/0188.html http://www.securityfocus.com/bid/1373 https://exchange.xforce.ibmcloud.com/vulnerabilities/4846 •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 2

IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html http://www.novell.com/linux/security/advisories/suse_security_announce_48.html http://www.securityfocus.com/bid/1078 •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. • https://www.exploit-db.com/exploits/19816 http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html http://www.novell.com/linux/security/advisories/suse_security_announce_45.html http://www.redhat.com/support/errata/RHSA-2000-009.html http://www.redhat.com/support/errata/RHSA-2000-045.html http://www.securityfocus.com/bid/1069 •