13 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

12 Mar 2001 — Insecure file permissions for Netscape FastTrack Server 2.x, Enterprise Server 2.0, and Proxy Server 2.5 in SCO UnixWare 7.0.x and 2.1.3 allow an attacker to gain root privileges. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.08a •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — A vulnerability in the Sendmail configuration file sendmail.cf as installed in SCO UnixWare 7.1.0 and earlier allows an attacker to gain root privileges. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.10a •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — Vulnerability in the passthru driver in SCO UnixWare 7.1.0 allows an attacker to cause a denial of service. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.13a •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — Some packaging commands in SCO UnixWare 7.1.0 have insecure privileges, which allows local users to add or remove software packages. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.09b •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 1

04 Dec 1999 — UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19661 •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

10 Nov 1999 — Denial of service in BIND named via malformed SIG records. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

10 Nov 1999 — Denial of service in BIND named via naptr. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

27 Jan 1999 — Vulnerability in (1) rlogin daemon rshd and (2) scheme on SCO UNIX OpenServer 5.0.5 and earlier, and SCO UnixWare 7.0.1 and earlier, allows remote attackers to gain privileges. • ftp://ftp.sco.COM/SSE/sse020.ltr •

CVSS: 10.0EPSS: 79%CPEs: 76EXPL: 2

08 Apr 1998 — Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 •

CVSS: 7.5EPSS: 2%CPEs: 26EXPL: 0

08 Apr 1998 — Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX •