Page 10 of 145 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

02 Nov 1999 — Buffer overflow in uum program for Canna input system allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19582 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

02 Nov 1999 — Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19583 •

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 1

23 Sep 1999 — Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. • https://www.exploit-db.com/exploits/19507 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 1

22 Sep 1999 — The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19509 •

CVSS: 9.8EPSS: 7%CPEs: 33EXPL: 0

13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 1

13 Sep 1999 — The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. • https://www.exploit-db.com/exploits/19498 •

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 1

13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 5

08 Sep 1999 — Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable. • https://www.exploit-db.com/exploits/19216 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

09 Aug 1999 — sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. • http://www.securityfocus.com/bid/575 •