Page 3 of 36 results (0.003 seconds)

CVSS: 10.0EPSS: 3%CPEs: 42EXPL: 1

06 Feb 1997 — Buffer overflow of rlogin program using TERM environmental variable. • https://www.exploit-db.com/exploits/19203 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 50EXPL: 3

06 Jan 1997 — Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. • https://www.exploit-db.com/exploits/19066 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

01 Jan 1997 — Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0217 •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

15 Aug 1996 — Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access. • http://www.cert.org/advisories/CA-1996-19.html •

CVSS: 7.8EPSS: 0%CPEs: 39EXPL: 0

03 Jul 1996 — Local user gains root privileges via buffer overflow in rdist, via expstr() function. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

18 Apr 1996 — pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0078 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

23 Aug 1995 — SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html •

CVSS: 9.1EPSS: 1%CPEs: 5EXPL: 0

14 Feb 1994 — Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone. • http://www.securityfocus.com/bid/24 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

01 Oct 1993 — The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

17 Sep 1993 — /usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 •