Page 2 of 23 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 33EXPL: 0

The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.ciac.org/ciac/bulletins/k-001.shtml http://www.securityfocus.com/bid/637 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

Vulnerability in Compaq Tru64 UNIX edauth command. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0714 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Digital Unix 4.0 has a buffer overflow in the inc program of the mh package. • http://www.ciac.org/ciac/bulletins/j-027.shtml http://www.securityfocus.com/archive/1/12121 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

Buffer overflow in at program in Digital UNIX 4.0 allows local users to gain root privileges via a long command line argument. • http://ftp1.support.compaq.com/public/dunix/v4.0d/ssrt0583u.README http://www.securityfocus.com/archive/1/12121 https://exchange.xforce.ibmcloud.com/vulnerabilities/3138 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file. • https://www.exploit-db.com/exploits/261 ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a http://marc.info/?l=bugtraq&m=90686250717719&w=2 http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen http://www.securityfocus.com/archive/1/10420 •