Page 75 of 382 results (0.010 seconds)

CVSS: 10.0EPSS: 8%CPEs: 32EXPL: 5

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0145 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf. • http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html http://marc.info/?l=bugtraq&m=87602661419259&w=2 http://www.iss.net/security_center/static/7244.php http://www.redhat.com/support/errata/rh42-errata-general.html#db •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 http://www.securityfocus.com/bid/759 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 1

Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. • https://www.exploit-db.com/exploits/19474 http://www.securityfocus.com/bid/611 •