Page 12 of 96 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 3

FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files. • https://www.exploit-db.com/exploits/21407 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:23.stdio.asc http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0033.html http://online.securityfocus.com/archive/1/268970 http://online.securityfocus.com/archive/1/269102 http://www.ciac.org/ciac/bulletins/m-072.shtml http://www.iss.net/security_center/static/8920.php http://www.kb.cert.org/vuls/id/809347 http://www.osvdb.org/6095 http://www.secu •

CVSS: 10.0EPSS: 19%CPEs: 8EXPL: 1

Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name. Desbordamiento de montón (heap) en la función cfsd_calloc de Solaris cachefsd permite a atacantes remotos ejecutar código arbitrario mediante una petición con nombres de directorio y de caché largos. • https://www.exploit-db.com/exploits/21437 http://archives.neohapsis.com/archives/bugtraq/2002-05/0026.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309 http://www.cert.org/advisories/CA-2002-11.html http://www.iss.net/security_center/static/8999.php http://www.kb.cert.org/vuls/id/635811 http://www.securityfocus.com/bid/4674 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A124 https://oval.cisecurity.org/repository/ •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

Buffer overflow in Xsun on Solaris 2.6 through 8 allows local users to gain root privileges via a long -co (color database) command line argument. Desbordamiento de buffer en XSun sobre Solaris 2.6 a 8 permite a un usuario local obtener privilegios de root mediante un argumento -co largo de linea de comandos. • https://www.exploit-db.com/exploits/21360 http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0000.html http://marc.info/?l=bugtraq&m=101776858410652&w=2 http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fpatches%2F108652 http://www.securityfocus.com/bid/4408 https://exchange.xforce.ibmcloud.com/vulnerabilities/8703 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef% •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

cachefsd in Solaris 2.6, 7, and 8 allows remote attackers to cause a denial of service (crash) via an invalid procedure call in an RPC request. cachefsd en Solaris 2.6, 7 y 8 permite a atacantes remotos causar una denegación de servicio (caída) mediante una llamada a procedimiento inválida en una petición RPC. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0047.html http://online.securityfocus.com/archive/1/270122 http://www.esecurityonline.com/advisories/eSO4197.asp http://www.securityfocus.com/bid/4634 https://exchange.xforce.ibmcloud.com/vulnerabilities/8956 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4329 •

CVSS: 7.2EPSS: 54%CPEs: 4EXPL: 0

Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument. Desbordamiento de Buffer en cachefsd en Solaris 2.6, 7 y 8 permite a usarios locales ganar privilegios de root mediante un argumento de mount largo. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00416.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309 http://www.esecurityonline.com/advisories/eSO4198.asp http://www.kb.cert.org/vuls/id/161931 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A43 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A97 •