Page 10 of 49 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 http://www.iss.net/security_center/static/7480.php •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash. • http://www.cert.org/advisories/CA-1993-03.html http://www.securityfocus.com/bid/59 https://exchange.xforce.ibmcloud.com/vulnerabilities/521 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •