Page 6 of 59 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

17 May 2003 — lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories. lv lee un fichero .lv desde el directorio de trabajo actual, lo que permitiría que usuarios locales ejecuten comandos arbitrarios como otros usuarios lv (colocando ficheros .lv dentro de otros directorios). • http://www.debian.org/security/2003/dsa-304 •

CVSS: 9.8EPSS: 0%CPEs: 11EXPL: 0

17 May 2003 — tcpdump does not properly drop privileges to the pcap user when starting up. Cuando se arranca tcpdump, éste no rebaja privilegios adecuadamente al usuario pcap • http://www.redhat.com/support/errata/RHSA-2003-151.html •

CVSS: 8.1EPSS: 0%CPEs: 4EXPL: 0

03 Mar 2003 — A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=75418 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

19 Feb 2003 — The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su. La configuración por defecto de pam_xauth en Red Hat Linux 7.1 a 8.0 envia MIT-Magic-Cookies a sesiones X nuevas, lo que podría permitir a usuarios locales ganar privilegios de root robando las cookies de un fichero .xauth temporal, q... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000693 •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

01 Feb 2003 — Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client. El cliente de ftp Kerberos permite a sitios FTP remotos ejecutar código arbitrario mediante un carácter de tubería (|) en un nombre de fichero que recupera el cliente • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0047.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 12%CPEs: 27EXPL: 0

28 Oct 2002 — dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts. El conversor dvips para ficheros Postscript en el paquete tetex llama a la función system() de forma insegura, lo que permite a atacantes ejecutar comandos arbitrarios mediante ciertos trabajos de impresión, posiblemente conteniendo fuentes. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000537 •

CVSS: 10.0EPSS: 0%CPEs: 38EXPL: 1

15 Mar 2002 — Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. Error 'off-by-one' en el código de canal de OpenSSH 2.0 a 3.0.2 permite a usuarios locales o a servidores remotos ganar privilegios. • https://www.exploit-db.com/exploits/21314 • CWE-193: Off-by-one Error •

CVSS: 9.8EPSS: 11%CPEs: 12EXPL: 1

02 Jul 2001 — Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands. • https://www.exploit-db.com/exploits/20646 •

CVSS: 5.5EPSS: 0%CPEs: 13EXPL: 2

26 Mar 2001 — glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files. • https://www.exploit-db.com/exploits/258 •