Show filters
28 Total Results
Displaying 21-28 of 28
Sort by:
Attacker Value
Unknown
CVE-2002-2185
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
0
Attacker Value
Unknown
CVE-2002-1787
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Buffer overflow in uux in eoe.sw.uucp package of SGI IRIX 6.5 through 6.5.17 allows local users to execute arbitrary code via unknown attack vectors.
0
Attacker Value
Unknown
CVE-2002-1791
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
SGI IRIX 6.5 through 6.5.17 creates temporary desktop files with world-writable permissions, which allows local users to overwrite or corrupt those files.
0
Attacker Value
Unknown
CVE-2002-1584
Disclosure Date: December 27, 2002 (last updated February 22, 2025)
Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges.
0
Attacker Value
Unknown
CVE-2002-1323
Disclosure Date: December 11, 2002 (last updated February 22, 2025)
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
0
Attacker Value
Unknown
CVE-2002-1265
Disclosure Date: November 12, 2002 (last updated February 22, 2025)
The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote attackers to cause a denial of service (hang).
0
Attacker Value
Unknown
CVE-2000-1220
Disclosure Date: January 08, 2000 (last updated February 22, 2025)
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
0
Attacker Value
Unknown
CVE-2000-1221
Disclosure Date: January 08, 2000 (last updated February 22, 2025)
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
0