Page 24 of 141 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

In Solaris, an SNMP subagent has a default community string that allows remote attackers to execute arbitrary commands as root, or modify system parameters. • http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

SunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/176 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/181 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0339 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 1

Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges. • https://www.exploit-db.com/exploits/19126 http://marc.info/?l=bugtraq&m=90221104525997&w=2 http://www.securityfocus.com/bid/160 •