9 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0362.html http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-031-01 http://www.calderasystems.com/support/security/advisories/CSSA-2001-029.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-066.php3 http://www.redhat.com/support/errata/RHSA-2001-097.html http://www.securityfocus.com/archive/1/197727 https://exchange.xforce.ibmcloud.com/vulnerabilities/6862 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. • http://www.securityfocus.com/bid/359 •

CVSS: 10.0EPSS: 8%CPEs: 17EXPL: 2

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto. • https://www.exploit-db.com/exploits/19086 https://www.exploit-db.com/exploits/19087 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

The debug option in Caldera Linux smail allows remote attackers to execute commands via shell metacharacters in the -D option for the rmail command. La opción de depuración en smail de Caldera Linux permite a atacantes remotos ejecutar comandos mediante metacaracteres de shell en la opción -D del comando rmail. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-001.0.txt http://www.securityfocus.com/bid/1268 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program. • http://www.caldera.com/support/security/advisories/SA-1998.35.txt http://www.securityfocus.com/archive/1/11397 https://exchange.xforce.ibmcloud.com/vulnerabilities/1406 •