13 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 46EXPL: 2

27 Feb 2002 — Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice. Corrupción de memoria en el comando "at" permite que usuarios locales ejecuten código arbitrario haciendo uso de un tiempo de ejecución mal escrito (lo que provoca que at libere la misma memoria dos veces). • https://www.exploit-db.com/exploits/21229 •

CVSS: 9.8EPSS: 2%CPEs: 9EXPL: 0

21 Dec 2001 — Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands. Vulnerabilidad de cadena de formato en la función de retrollamada (callback) en common.c en la librería Cyrus SASL (cyrus-sasl) podría permitr a atacantes remotos ejecutar comandos de su elección. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:15.cyrus-sasl.asc •

CVSS: 9.1EPSS: 0%CPEs: 14EXPL: 0

06 Dec 2001 — Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432 •

CVSS: 9.1EPSS: 0%CPEs: 15EXPL: 0

18 Jul 2001 — Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0362.html •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

26 Mar 2001 — kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges. • http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt •

CVSS: 5.5EPSS: 0%CPEs: 15EXPL: 0

12 Mar 2001 — inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations. • http://marc.info/?l=bugtraq&m=97916374410647&w=2 •

CVSS: 10.0EPSS: 83%CPEs: 7EXPL: 5

19 Dec 2000 — Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/227 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 3

19 Dec 2000 — Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. • https://www.exploit-db.com/exploits/217 •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

14 Nov 2000 — Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 18EXPL: 0

03 Jul 2000 — makewhatis in Linux man package allows local users to overwrite files via a symlink attack. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-021.0.txt •