Page 2 of 66 results (0.017 seconds)

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 4

Buffer overflow in the Strcmp function in the XKEYBOARD extension in X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment variable value. Desbordamiento de búfer en función Strcmp en la extensión XKEYBOARD en Window System X11R6.4 y anteriores, según lo utilizado en SCO UnixWare 7.1.3 y Sun Solaris 8 hasta la 10, permite a un usuario local subir privilegios a través del valor de la larga variable de entorno _XKB_CHARSET. • https://www.exploit-db.com/exploits/2332 https://www.exploit-db.com/exploits/2331 https://www.exploit-db.com/exploits/2330 https://www.exploit-db.com/exploits/2360 http://secunia.com/advisories/21815 http://secunia.com/advisories/21845 http://secunia.com/advisories/21856 http://secunia.com/advisories/21993 http://securityreason.com/securityalert/1545 http://securitytracker.com/id?1016806 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102570-1 http://support. •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

Unspecified vulnerability in ptrace in SCO UnixWare 7.1.3 and 7.1.4 allows local users to gain privileges via unspecified vectors. • https://www.exploit-db.com/exploits/1534 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.9/SCOSA-2006.9.txt http://secunia.com/advisories/18958 http://securitytracker.com/id?1015676 http://www.idefense.com/application/poi/display?type=vulnerabilities http://www.securityfocus.com/bid/16765 https://exchange.xforce.ibmcloud.com/vulnerabilities/24856 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in uidadmin in SCO Unixware 7.1.3 and 7.1.4 allows local users to execute arbitrary code via a -S (scheme) argument that specifies a large file, a different vulnerability than CVE-2001-1063. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.54 http://secunia.com/advisories/17986 http://secunia.com/advisories/18660 http://securityreason.com/securityalert/251 http://securitytracker.com/id?1015342 http://support.avaya.com/elmodocs2/security/ASA-2006-034.htm http://www.idefense.com/application/poi/display?id=350&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/15811 https://exchange.xforce.ibmcloud.com/vulnerabilities/23550 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Stack-based buffer overflow in ppp in SCO Unixware 7.1.3 and 7.1.4, and possibly earlier versions, allows local users to execute arbitrary code via a long argument to the (1) prompt or (2) defprompt command. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.41/SCOSA-2005.41.txt http://secunia.com/advisories/17275 http://securityreason.com/securityalert/101 http://securitytracker.com/id?1015098 http://www.idefense.com/application/poi/display?type=vulnerabilities http://www.osvdb.org/20155 http://www.securityfocus.com/bid/15159 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

RPC portmapper (rpcbind) in SCO UnixWare 7.1.1 m5, 7.1.3 mp5, and 7.1.4 mp2 allows remote attackers or local users to cause a denial of service (lack of response) via multiple invalid portmap requests. RPC portmapper (rpcbind) en SCO UnixWare 7.1.1 m5, 7.1.3 mp5, y 7.1.4 mp2 permite que atacantes remotos o usuarios locales causen una dengación de servicio (falta de respuesta) mediante múltiples peticiones portmap inválidas. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.31/SCOSA-2005.31.txt http://marc.info/?l=bugtraq&m=112247187722821&w=2 http://secunia.com/advisories/16228 http://www.securityfocus.com/bid/14360 •