Page 69 of 363 results (0.010 seconds)

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4884 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4876 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable. • https://www.exploit-db.com/exploits/19811 https://www.exploit-db.com/exploits/19812 http://archives.neohapsis.com/archives/bugtraq/2000-03/0168.html http://www.redhat.com/support/errata/RHSA-2000-016.html http://www.securityfocus.com/bid/1060 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 3

Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. • https://www.exploit-db.com/exploits/255 https://www.exploit-db.com/exploits/19778 https://www.exploit-db.com/exploits/19779 http://www.securityfocus.com/bid/1011 •

CVSS: 10.0EPSS: 1%CPEs: 32EXPL: 1

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://seclists.org/lists/bugtraq/2000/Jan/0116.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/39001 http://www.l0pht.com/advisories/lpd_advisory http://www.redhat.com/support/errata/RHSA-2000-002.html http://www.securityfocus.com/bid/927 https://exchange. •