Page 111 of 564 results (0.007 seconds)

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

SunOS 4.1.2 and earlier allows local users to gain privileges via "LD_*" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116 http://www.cert.org/advisories/CA-1992-11.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3152 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

In SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0167 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

The installation of Sun Source (sunsrc) tapes allows local users to gain root privileges via setuid root programs (1) makeinstall or (2) winstall. • https://www.exploit-db.com/exploits/19043 https://www.exploit-db.com/exploits/19042 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/107&type=0&nav=sec.sba http://www.cert.org/advisories/CA-1991-07.html http://www.securityfocus.com/bid/21 http://www.securityfocus.com/bid/22 https://exchange.xforce.ibmcloud.com/vulnerabilities/582 •