runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments.
Max CVSS
7.2
EPSS Score
0.05%
Published
2002-11-29
Updated
2008-09-10
Buffer overflows in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the i4l package on SuSE 7.3, 8.0, and possibly other operating systems, may allow local users to gain privileges.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-09-05
Updated
2017-11-02
Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command.
Max CVSS
7.5
EPSS Score
0.40%
Published
2002-08-12
Updated
2008-09-05
shadow package in SuSE 8.0 allows local users to destroy the /etc/passwd and /etc/shadow files or assign extra group privileges to some users by changing filesize limits before calling programs that modify the files.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-08-12
Updated
2008-09-10
ifup-dhcp script in the sysconfig package for SuSE 8.0 allows remote attackers to execute arbitrary commands via spoofed DHCP responses, which are stored and executed in a file.
Max CVSS
7.5
EPSS Score
1.82%
Published
2002-08-12
Updated
2008-09-10
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
Max CVSS
10.0
EPSS Score
0.87%
Published
2002-03-15
Updated
2024-02-02
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-03-08
Updated
2023-03-03
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-02-27
Updated
2017-10-10
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!