2 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument. Desbordamiento de Buffer en SAS/Base 8.0 y 8.1 oSAS/Integration Technologies 8.0 y 8.1 permite a usuarios locales ejecutar código arbitrario mediante argumentos de linea de comando largos. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0032.html http://online.securityfocus.com/archive/1/252847 http://online.securityfocus.com/archive/1/252891 http://www.iss.net/security_center/static/8017.php http://www.sas.com/service/techsup/unotes/SN/004/004201.html http://www.securityfocus.com/bid/3979 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument. Vulnerabilidad en cadena de formato en SAStcpd en SAS/Base oobjspawn en Sas/Integration Technologies 8.0 y 8.1permite a usuarios locales ejecutar código arbitrario mediante especificadores de formato en un argumento de línea de comandos. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0032.html http://online.securityfocus.com/archive/1/252847 http://online.securityfocus.com/archive/1/252891 http://www.iss.net/security_center/static/8018.php http://www.sas.com/service/techsup/unotes/SN/004/004201.html http://www.securityfocus.com/bid/3980 •