Format string vulnerability in ypbind-mt in SuSE SuSE-6.2, and possibly other Linux operating systems, allows an attacker to gain root privileges.
Max CVSS
10.0
EPSS Score
0.70%
Published
2000-12-11
Updated
2017-10-10
Format string vulnerability in logging function of ypbind 3.3, while running in debug mode, leaks file descriptors and allows an attacker to cause a denial of service.
Max CVSS
10.0
EPSS Score
1.03%
Published
2000-12-11
Updated
2017-10-10
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
Max CVSS
10.0
EPSS Score
0.48%
Published
2000-11-14
Updated
2018-10-30
String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
0.73%
Published
2000-10-20
Updated
2008-09-10
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
8.05%
Published
2000-07-16
Updated
2018-05-03
Tnef program in Linux systems allows remote attackers to overwrite arbitrary files via TNEF encoded compressed attachments which specify absolute path names for the decompressed output.
Max CVSS
10.0
EPSS Score
0.32%
Published
2000-07-10
Updated
2008-09-10
Buffer overflow in the XDMCP parsing code of GNOME gdm, KDE kdm, and wdm allows remote attackers to execute arbitrary commands or cause a denial of service via a long FORWARD_QUERY request.
Max CVSS
10.0
EPSS Score
7.14%
Published
2000-05-24
Updated
2008-09-10
SuSE Linux IMAP server allows remote attackers to bypass IMAP authentication and gain privileges.
Max CVSS
10.0
EPSS Score
0.61%
Published
2000-03-15
Updated
2008-09-10
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!