Page 16 of 141 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 2

Buffer overflow in whodo in Solaris SunOS 5.5.1 through 5.8 allows local users to execute arbitrary code via a long (1) SOR or (2) CFIME environment variable. • https://www.exploit-db.com/exploits/20974 http://archives.neohapsis.com/archives/bugtraq/2001-07/0076.html http://www.securityfocus.com/bid/2935 https://exchange.xforce.ibmcloud.com/vulnerabilities/6802 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A34 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A47 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 3

Buffer overflow in Xsun in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20743 http://archives.neohapsis.com/archives/bugtraq/2001-04/0158.html http://www.securityfocus.com/bid/2561 https://exchange.xforce.ibmcloud.com/vulnerabilities/6343 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A555 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20684 http://archives.neohapsis.com/archives/bugtraq/2001-03/0394.html http://www.securityfocus.com/bid/2475 https://exchange.xforce.ibmcloud.com/vulnerabilities/6284 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

Buffer overflow in dtsession on Solaris, and possibly other operating systems, allows local users to gain privileges via a long LANG environmental variable. • https://www.exploit-db.com/exploits/20766 http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html •

CVSS: 6.4EPSS: 3%CPEs: 2EXPL: 2

FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. • https://www.exploit-db.com/exploits/20764 http://www.securityfocus.com/archive/1/177200 http://www.securityfocus.com/bid/2601 •