Page 7 of 73 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

25 Jul 2003 — Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target. Linux 2.4.x pemite a atacantes remotos suplantar entradas en la tabla de reenvio de puente (bridge forwarding) mediante paquetes falsificados cuya dirección de origen es la misma que la del objetivo. • http://www.debian.org/security/2004/dsa-358 •

CVSS: 10.0EPSS: 64%CPEs: 28EXPL: 4

07 Mar 2003 — Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. Desbordamiento de búfer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecución arbitraria de código mediante ciertos campos de dirección formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la función crackaddr del fichero heade... • https://www.exploit-db.com/exploits/411 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

12 Mar 2001 — traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

12 Mar 2001 — traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

02 Mar 2000 — The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

24 Feb 2000 — buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters. • https://www.exploit-db.com/exploits/19764 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

24 Feb 2000 — setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file. • https://www.exploit-db.com/exploits/19765 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

12 Jan 2000 — get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. • https://www.exploit-db.com/exploits/19723 •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 1

09 Jun 1999 — The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 •

CVSS: 10.0EPSS: 16%CPEs: 10EXPL: 2

12 Oct 1998 — Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems. • https://www.exploit-db.com/exploits/19096 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •