Page 10 of 143 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 1

23 Sep 1999 — Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. • https://www.exploit-db.com/exploits/19507 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 1

22 Sep 1999 — The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19509 •

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 1

13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVSS: 9.8EPSS: 1%CPEs: 33EXPL: 0

13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 1

13 Sep 1999 — The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. • https://www.exploit-db.com/exploits/19498 •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 5

08 Sep 1999 — Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable. • https://www.exploit-db.com/exploits/19216 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 2

01 Jul 1999 — Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 1

09 Jun 1999 — The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 •

CVSS: 9.1EPSS: 1%CPEs: 8EXPL: 1

07 Jun 1999 — rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 •