Page 58 of 289 results (0.007 seconds)

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 0%CPEs: 42EXPL: 1

Buffer overflow of rlogin program using TERM environmental variable. • https://www.exploit-db.com/exploits/19203 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 1

cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. • http://marc.info/?l=bugtraq&m=110763404701519&w=2 http://secunia.com/advisories/14357 http://secunia.com/advisories/17063 http://secunia.com/advisories/17532 http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf http://www.debian.org/security/2005/dsa-664 http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391 http://www.mandriva.com/security/advisories?name=MDKSA-2005:032 http://www.redhat.com/support/errata/RHSA-2005-073.html http://www.redhat.com/support&# •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 2

rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request. • https://www.exploit-db.com/exploits/20025 http://archives.neohapsis.com/archives/bugtraq/2000-06/0073.html http://www.securityfocus.com/bid/1372 https://exchange.xforce.ibmcloud.com/vulnerabilities/5050 •