Page 80 of 495 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0429.html http://marc.info/?l=bugtraq&m=97249980727834&w=2 http://www.redhat.com/support/errata/RHSA-2000-087.html •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1558 •

CVSS: 7.5EPSS: 9%CPEs: 9EXPL: 1

mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/26630 http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1559 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 1

Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters. • https://www.exploit-db.com/exploits/20285 http://www.linux-mandrake.com/en/security/MDKSA-2000-056.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA-2000-080.html http://www.securityfocus.com/bid/1785 http://xforce.iss.net/alerts/advise64.php https://exchange.xforce.ibmcloud.com/vulnerabilities/5320 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0474.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0479.html http://www.redhat.com/support/errata/RHSA-2000-030.html http://www.securityfocus.com/archive/1/73220 http://www.securityfocus.com/bid/1539 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000802105050.A11733%40rak.isternet.sk •