Show filters
39 Total Results
Displaying 31-39 of 39
Sort by:
Attacker Value
Unknown

CVE-1999-0032

Disclosure Date: October 25, 1996 (last updated February 22, 2025)
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
0
Attacker Value
Unknown

CVE-1999-0234

Disclosure Date: October 08, 1996 (last updated February 22, 2025)
Bash treats any character with a value of 255 as a command separator.
0
Attacker Value
Unknown

CVE-1999-0022

Disclosure Date: July 03, 1996 (last updated February 22, 2025)
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
0
Attacker Value
Unknown

CVE-1999-0019

Disclosure Date: April 24, 1996 (last updated February 22, 2025)
Delete or create a file via rpc.statd, due to invalid information.
0
Attacker Value
Unknown

CVE-1999-0078

Disclosure Date: April 18, 1996 (last updated February 22, 2025)
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
0
Attacker Value
Unknown

CVE-1999-0208

Disclosure Date: December 12, 1995 (last updated February 22, 2025)
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
0
Attacker Value
Unknown

CVE-1999-0073

Disclosure Date: October 13, 1995 (last updated February 22, 2025)
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.
0
Attacker Value
Unknown

CVE-1999-1022

Disclosure Date: October 02, 1994 (last updated February 22, 2025)
serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program.
0
Attacker Value
Unknown

CVE-1999-1468

Disclosure Date: October 22, 1991 (last updated February 22, 2025)
rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable.
0