Page 70 of 495 results (0.004 seconds)

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 1

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/20493 http://marc.info/?l=bugtraq&m=98749102621604&w=2 http://marc.info/?l=bugtraq&m=99106787825229&w=2 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-047.php3?dis=8.0 http://www.redhat.com/support/errata/RHSA-2001-042.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6367 •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

initscript in setserial 2.17-4 and earlier uses predictable temporary file names, which could allow local users to conduct unauthorized operations on files. • http://rhn.redhat.com/errata/RHSA-2001-110.html http://www.iss.net/security_center/static/7177.php http://www.securityfocus.com/bid/3367 •

CVSS: 4.6EPSS: 0%CPEs: 13EXPL: 2

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. • https://www.exploit-db.com/exploits/20843 http://archives.neohapsis.com/archives/bugtraq/2001-05/0087.html http://www.novell.com/linux/security/advisories/2001_019_man_txt.html http://www.redhat.com/support/errata/RHSA-2001-069.html http://www.securityfocus.com/archive/1/190136 http://www.securityfocus.com/bid/2711 https://exchange.xforce.ibmcloud.com/vulnerabilities/6530 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server. Apache with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the. • https://www.exploit-db.com/exploits/21112 http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0083.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0087.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0094.html http://www.securityfocus.com/archive/1/213667 http://www.securityfocus.com/bid/3335 https://exchange.xforce.ibmcloud.com/vulnerabilities/7129 - •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. • https://www.exploit-db.com/exploits/21095 http://marc.info/?l=bugtraq&m=99892644616749&w=2 http://www.redhat.com/support/errata/RHSA-2001-102.html http://www.securityfocus.com/bid/3241 https://exchange.xforce.ibmcloud.com/vulnerabilities/16509 •