Page 24 of 145 results (0.019 seconds)

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 0

Buffer overflows in Sun libnsl allow root access. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/172 http://www-1.ibm.com/support/search.wss?rs=0&q=IX80543&apar=only •

CVSS: 10.0EPSS: 9%CPEs: 76EXPL: 2

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/167 •

CVSS: 10.0EPSS: 4%CPEs: 31EXPL: 2

Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 https://www.exploit-db.com/exploits/19101 ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX http://www.securityfocus.com/bid/122 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 1

A Unix account has a default, null, blank, or missing password. • https://www.exploit-db.com/exploits/41694 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0502 - •