Page 11 of 62 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 3

Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument. • https://www.exploit-db.com/exploits/332 https://www.exploit-db.com/exploits/19160 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.18.solaris.chkey.buffer.overflow.vul http://marc.info/?l=bugtraq&m=87602167418335&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/144 http://www.iss.net/security_center/static/7442.php http://www.securityfocus.com/bid/207 •

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 2

The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 http://marc.info/?l=bugtraq&m=87602167418317&w=2 http://marc.info/?l=bugtraq&m=87602248718482&w=2 http://www.iss.net/security_center/static/7172.php http://www.securityfocus.com/bid/456 •

CVSS: 7.2EPSS: 0%CPEs: 43EXPL: 5

Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. • https://www.exploit-db.com/exploits/331 https://www.exploit-db.com/exploits/322 https://www.exploit-db.com/exploits/19200 https://www.exploit-db.com/exploits/19201 https://www.exploit-db.com/exploits/19202 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040 •

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 1

Buffer overflow in Solaris fdformat command gives root access to local users. • https://www.exploit-db.com/exploits/328 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/138 •