Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Max CVSS
10.0
EPSS Score
4.41%
Published
1998-04-01
Updated
2018-10-30
Buffer overflow in NIS+, in Sun's rpc.nisd program.
Max CVSS
10.0
EPSS Score
13.97%
Published
1998-06-08
Updated
2018-10-30
Unauthorized privileged access or denial of service via dtappgather program in CDE.
Max CVSS
7.2
EPSS Score
0.04%
Published
1998-01-21
Updated
2008-09-09
Teardrop IP denial of service.
Max CVSS
5.0
EPSS Score
0.13%
Published
1997-12-16
Updated
2018-05-03
Land IP denial of service.
Max CVSS
5.0
EPSS Score
0.15%
Published
1997-12-01
Updated
2008-09-09
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Max CVSS
7.2
EPSS Score
0.04%
Published
1996-07-03
Updated
2018-10-30
Buffer overflow in xlock program allows local users to execute commands as root.
Max CVSS
7.2
EPSS Score
0.04%
Published
1997-04-26
Updated
2022-08-17
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Max CVSS
7.2
EPSS Score
0.06%
Published
1997-05-01
Updated
2022-08-17
Buffer overflow of rlogin program using TERM environmental variable.
Max CVSS
10.0
EPSS Score
0.94%
Published
1997-02-06
Updated
2024-02-09
Buffer overflow in HP-UX newgrp program.
Max CVSS
7.2
EPSS Score
0.06%
Published
1996-12-01
Updated
2022-08-17
Vacation program allows command execution by remote users through a sendmail command.
Max CVSS
7.5
EPSS Score
0.75%
Published
1998-11-16
Updated
2008-09-09
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
Max CVSS
1.9
EPSS Score
0.04%
Published
1996-04-18
Updated
2022-08-17
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Max CVSS
10.0
EPSS Score
6.01%
Published
1997-10-29
Updated
2022-08-17
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.
Max CVSS
5.0
EPSS Score
1.49%
Published
1997-12-16
Updated
2018-08-22
swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access.
Max CVSS
7.2
EPSS Score
0.04%
Published
1996-12-19
Updated
2022-08-17
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
Max CVSS
4.6
EPSS Score
0.05%
Published
1996-12-03
Updated
2022-08-17
Local users can start Sendmail in daemon mode and gain root privileges.
Max CVSS
7.2
EPSS Score
0.04%
Published
1996-11-16
Updated
2008-09-09
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
Max CVSS
7.2
EPSS Score
0.04%
Published
1996-09-11
Updated
2008-09-09
Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access.
Max CVSS
2.1
EPSS Score
0.07%
Published
1996-08-15
Updated
2018-10-30
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
Max CVSS
7.2
EPSS Score
0.04%
Published
1996-06-26
Updated
2022-08-17
Denial of service of inetd on Linux through SYN and RST packets.
Max CVSS
5.0
EPSS Score
0.22%
Published
1997-11-01
Updated
2022-08-17
HP Remote Watch allows a remote user to gain root access.
Max CVSS
10.0
EPSS Score
0.86%
Published
1996-10-01
Updated
2022-08-17
Buffer overflow in HP-UX cstm program allows local users to gain root privileges.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-12-20
Updated
2022-08-17
HP-UX gwind program allows users to modify arbitrary files.
Max CVSS
4.6
EPSS Score
0.04%
Published
1996-10-01
Updated
2008-09-09
HP-UX vgdisplay program gives root access to local users.
Max CVSS
7.2
EPSS Score
0.04%
Published
1997-02-01
Updated
2013-07-21
287 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11 12
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!