VYPR
Vendor
Products
4
CVEs
10
Across products
18
Status
Private

Products

4

Recent CVEs

10
CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-1999-00460.040.07Feb 6, 1997Buffer overflow of rlogin program using TERM environmental variable.
CVE-2006-43920.030.01Oct 3, 2006The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.
CVE-1999-00320.030.00Oct 25, 1996Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
CVE-1999-09560.000.00Sep 19, 1997The NeXT NetInfo _writers property allows local users to gain root privileges or conduct a denial of service.
CVE-1999-00780.000.00Apr 18, 1996pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
CVE-1999-14680.000.01Oct 22, 1991rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable.
CVE-1999-11930.000.01May 14, 1991The "me" user in NeXT NeXTstep 2.1 and earlier has wheel group privileges, which could allow the me user to use the su command to become root.
CVE-1999-13910.000.00Oct 3, 1990Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions.
CVE-1999-11980.000.01Oct 3, 1990BuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges.
CVE-1999-13920.000.01Oct 3, 1990Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges.