Page 3 of 24 results (0.029 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

lpusers as included with SCO OpenServer 5.0 through 5.0.6 allows a local attacker to gain additional privileges via a buffer overflow attack in the '-u' command line parameter. • https://www.exploit-db.com/exploits/20739 http://archives.neohapsis.com/archives/bugtraq/2001-03/0407.html http://security-archive.merton.ox.ac.uk/bugtraq-200104/0221.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6292 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in programs used by scoadmin and sysadmsh in SCO OpenServer 5.0.6a and earlier allow local users to gain privileges via a long TERM environment variable to (1) atcronsh, (2) auditsh, (3) authsh, (4) backupsh, (5) lpsh, (6) sysadm.menu, or (7) termsh. • http://www.securityfocus.com/archive/1/219966 http://www.securityfocus.com/archive/82/191216 https://exchange.xforce.ibmcloud.com/vulnerabilities/7281 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and earlier allows an attacker to cause a denial of service which prevents access to reserved port numbers below 1024. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

Buffer overflow in calserver in SCO OpenServer allows remote attackers to gain root access via a long message. • https://www.exploit-db.com/exploits/20620 ftp://ftp.sco.com/SSE/security_bulletins/SB-99.02a http://www.securityfocus.com/templates/archive.pike?list=1&date=1998-12-29&msg=AAh6GYsGU1%40leshka.chuvashia.su •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon. • ftp://ftp.sco.com/SSE/security_bulletins/SB-00.06a http://www.securityfocus.com/bid/997 http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000001bf78af%246d0d47a0%244d2f45a1%40jmagdych.na.nai.com http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=200002181449.JAA03436%40dragonfly.corp.home.net •