Page 10 of 49 results (0.006 seconds)

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone. • http://www.securityfocus.com/bid/24 https://vuls.cert.org/confluence/pages/viewpage.action?pageId=96665790 https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124517 https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124527 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba http://www.ciac.org/ciac/bulletins/e-01.shtml http://www.osvdb.org/6436 https://exchange.xforce.ibmcloud.com/vulnerabilities/549 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash. • http://www.cert.org/advisories/CA-1993-03.html http://www.securityfocus.com/bid/59 https://exchange.xforce.ibmcloud.com/vulnerabilities/521 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •