Page 14 of 174 results (0.009 seconds)

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. • http://www.securityfocus.com/bid/575 http://www.securityfocus.com/templates/archive.pike?list=1&msg=19990809134220.A1191%40hades.chaoz.org •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 2

Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 https://www.exploit-db.com/exploits/19421 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188 http://www.ciac.org/ciac/bulletins/j-051.shtml http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102 •

CVSS: 7.2EPSS: 0%CPEs: 30EXPL: 1

The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 http://marc.info/?l=bugtraq&m=94935300520617&w=2 •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 1

rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 http://marc.info/?l=bugtraq&m=91547759121289&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba http://www.cert.org/advisories/CA-99-05-statd-automountd.html http://www.ciac.org/ciac/bulletins/j-045.shtml http://www.securityfocus.com/bid/450 •