Page 10 of 141 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 1

22 Sep 1999 — The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19509 •

CVSS: 9.8EPSS: 7%CPEs: 33EXPL: 0

13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 1

13 Sep 1999 — The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. • https://www.exploit-db.com/exploits/19498 •

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 1

13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 5

08 Sep 1999 — Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable. • https://www.exploit-db.com/exploits/19216 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

09 Aug 1999 — sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. • http://www.securityfocus.com/bid/575 •

CVSS: 10.0EPSS: 5%CPEs: 9EXPL: 2

01 Jul 1999 — Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 1

09 Jun 1999 — The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

11 May 1999 — Buffer overflow in Solaris lpset program allows local users to gain root access. • https://www.exploit-db.com/exploits/19206 •