Page 2 of 54 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

06 Jan 2000 — Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. • http://www.securityfocus.com/bid/918 •

CVSS: 10.0EPSS: 6%CPEs: 3EXPL: 4

31 Dec 1999 — Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (aka System V listener) port, TCP port 2766. • https://www.exploit-db.com/exploits/20602 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 11EXPL: 0

09 Dec 1999 — Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190 •

CVSS: 10.0EPSS: 3%CPEs: 11EXPL: 1

07 Dec 1999 — Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode. • https://www.exploit-db.com/exploits/19663 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 1

22 Sep 1999 — The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19509 •

CVSS: 9.8EPSS: 7%CPEs: 33EXPL: 0

13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 1

13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 1

09 Jun 1999 — The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 •

CVSS: 9.1EPSS: 6%CPEs: 8EXPL: 1

07 Jun 1999 — rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 •