Page 20 of 129 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Several startup scripts in SCO OpenServer Enterprise System v 5.0.4p, including S84rpcinit, S95nis, S85tcp, and S89nfs, are vulnerable to a symlink attack, allowing a local user to gain root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0411 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

A weak encryption algorithm is used for passwords in SCO TermVision, allowing them to be easily decrypted by a local user. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0476 •

CVSS: 10.0EPSS: 8%CPEs: 17EXPL: 2

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto. • https://www.exploit-db.com/exploits/19086 https://www.exploit-db.com/exploits/19087 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

Vulnerability in (1) rlogin daemon rshd and (2) scheme on SCO UNIX OpenServer 5.0.5 and earlier, and SCO UnixWare 7.0.1 and earlier, allows remote attackers to gain privileges. • ftp://ftp.sco.COM/SSE/sse020.ltr ftp://ftp.sco.com/SSE/security_bulletins/SB-99.03b ftp://ftp.sco.com/SSE/security_bulletins/SB-99.06b •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type. • http://marc.info/?l=bugtraq&m=91278867118128&w=2 •