Page 2 of 62 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 2

12 Mar 2001 — Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter. • https://www.exploit-db.com/exploits/250 •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 2

14 Jun 2000 — Buffer overflow in ufsrestore in Solaris 8 and earlier allows local users to gain root privileges via a long pathname. • https://www.exploit-db.com/exploits/20014 •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

06 Jan 2000 — Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. • http://www.securityfocus.com/bid/918 •

CVSS: 10.0EPSS: 6%CPEs: 3EXPL: 4

31 Dec 1999 — Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (aka System V listener) port, TCP port 2766. • https://www.exploit-db.com/exploits/20602 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 14%CPEs: 9EXPL: 5

10 Dec 1999 — Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request. • https://www.exploit-db.com/exploits/19668 •

CVSS: 10.0EPSS: 1%CPEs: 11EXPL: 0

09 Dec 1999 — Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190 •

CVSS: 10.0EPSS: 3%CPEs: 11EXPL: 1

07 Dec 1999 — Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode. • https://www.exploit-db.com/exploits/19663 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 1

22 Sep 1999 — The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19509 •

CVSS: 9.8EPSS: 7%CPEs: 33EXPL: 0

13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 1

13 Sep 1999 — The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. • https://www.exploit-db.com/exploits/19498 •