Page 58 of 317 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 13EXPL: 2

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. • https://www.exploit-db.com/exploits/20843 http://archives.neohapsis.com/archives/bugtraq/2001-05/0087.html http://www.novell.com/linux/security/advisories/2001_019_man_txt.html http://www.redhat.com/support/errata/RHSA-2001-069.html http://www.securityfocus.com/archive/1/190136 http://www.securityfocus.com/bid/2711 https://exchange.xforce.ibmcloud.com/vulnerabilities/6530 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server. Apache with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the. • https://www.exploit-db.com/exploits/21112 http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0083.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0087.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0094.html http://www.securityfocus.com/archive/1/213667 http://www.securityfocus.com/bid/3335 https://exchange.xforce.ibmcloud.com/vulnerabilities/7129 - •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. • https://www.exploit-db.com/exploits/21095 http://marc.info/?l=bugtraq&m=99892644616749&w=2 http://www.redhat.com/support/errata/RHSA-2001-102.html http://www.securityfocus.com/bid/3241 https://exchange.xforce.ibmcloud.com/vulnerabilities/16509 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409 http://www.iss.net/security_center/static/6869.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060 http://www.redhat.com/support/errata/RHSA-2002-148.html http://www.securityfocus.com/bid/3073 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226 •

CVSS: 7.2EPSS: 0%CPEs: 40EXPL: 0

expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060 http://www.redhat.com/support/errata/RHSA-2002-148.html http://www.securityfocus.com/bid/3074 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=22187 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28224 https://exchange.xforce.ibmcloud.com/vulnerabilities/6870 •