Page 7 of 36 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Delete or create a file via rpc.statd, due to invalid information. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/135 •

CVSS: 1.9EPSS: 0%CPEs: 17EXPL: 0

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0078 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations. • ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX http://www.iss.net/security_center/static/7430.php •

CVSS: 10.0EPSS: 54%CPEs: 10EXPL: 2

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 https://www.exploit-db.com/exploits/20259 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208 •

CVSS: 10.0EPSS: 1%CPEs: 20EXPL: 0

Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0073 •