Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Max CVSS
10.0
EPSS Score
4.41%
Published
1998-04-01
Updated
2018-10-30
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Max CVSS
10.0
EPSS Score
9.01%
Published
1998-04-08
Updated
2018-10-30
Buffer overflow in statd allows root privileges.
Max CVSS
10.0
EPSS Score
0.28%
Published
1997-12-05
Updated
2018-10-30
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.
Max CVSS
10.0
EPSS Score
1.06%
Published
1995-10-13
Updated
2022-08-17
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
54.79%
Published
1995-12-12
Updated
2022-08-17
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.
Max CVSS
10.0
EPSS Score
0.58%
Published
1995-11-01
Updated
2022-08-17
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
Max CVSS
10.0
EPSS Score
0.71%
Published
1999-01-28
Updated
2022-08-17
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Max CVSS
10.0
EPSS Score
0.88%
Published
1999-07-19
Updated
2008-09-09
SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.
Max CVSS
10.0
EPSS Score
1.28%
Published
1999-05-19
Updated
2008-09-09
Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations.
Max CVSS
10.0
EPSS Score
0.37%
Published
1996-01-03
Updated
2008-09-10
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
Max CVSS
10.0
EPSS Score
8.73%
Published
2000-03-27
Updated
2017-10-10
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Max CVSS
10.0
EPSS Score
1.53%
Published
2000-10-20
Updated
2008-09-05
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
Max CVSS
10.0
EPSS Score
0.78%
Published
2000-10-20
Updated
2008-09-05
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
Max CVSS
10.0
EPSS Score
0.48%
Published
2000-11-14
Updated
2018-10-30
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Max CVSS
10.0
EPSS Score
1.07%
Published
2000-01-08
Updated
2017-07-11
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
Max CVSS
10.0
EPSS Score
2.10%
Published
2000-01-08
Updated
2017-07-11
Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Max CVSS
10.0
EPSS Score
1.90%
Published
2001-06-18
Updated
2020-01-21
Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
Max CVSS
10.0
EPSS Score
0.45%
Published
2001-06-18
Updated
2024-02-02
Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
Max CVSS
10.0
EPSS Score
1.09%
Published
2001-06-18
Updated
2024-02-02
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Max CVSS
10.0
EPSS Score
0.92%
Published
2001-08-14
Updated
2022-01-21

CVE-2001-0797

Public exploit
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Max CVSS
10.0
EPSS Score
97.24%
Published
2001-12-12
Updated
2018-10-30
Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument.
Max CVSS
10.0
EPSS Score
1.12%
Published
2001-12-06
Updated
2017-07-11

CVE-2001-0800

Public exploit
lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
Max CVSS
10.0
EPSS Score
96.55%
Published
2001-12-06
Updated
2008-09-05
xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges.
Max CVSS
10.0
EPSS Score
2.16%
Published
2002-07-03
Updated
2016-10-18

CVE-2002-1318

Public exploit
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.
Max CVSS
10.0
EPSS Score
14.54%
Published
2002-12-11
Updated
2018-05-03
254 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!