Page 7 of 39 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.6EPSS: 0%CPEs: 29EXPL: 0

Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. • http://www.cert.org/advisories/CA-1996-25.html •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 http://www.securityfocus.com/bid/716 •

CVSS: 7.2EPSS: 0%CPEs: 21EXPL: 2

Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. • https://www.exploit-db.com/exploits/19545 https://www.exploit-db.com/exploits/19544 ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX http://www.ciac.org/ciac/bulletins/i-042.shtml http://www.securityfocus.com/bid/707 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •