Page 3 of 118 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 91EXPL: 0

The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.securityfocus.com/advisories/6236 http://www.securityfocus.com/bid/6942 •

CVSS: 5.0EPSS: 10%CPEs: 9EXPL: 0

Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. • http://secunia.com/advisories/8092 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1 http://www.securityfocus.com/bid/6883 http://www.securitytracker.com/id?1006131 https://exchange.xforce.ibmcloud.com/vulnerabilities/11368 •

CVSS: 5.0EPSS: 56%CPEs: 10EXPL: 0

Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure. Vulnerabilidad de atravesamiento de directorios en el demonio servidor de Sun Kodak Color Management System (KMCS) (kcms_server) permite a atacantes remotos leer ficheros arbitrarios mediante el procedimiento KCS_OPEN_PROFILE • http://marc.info/?l=bugtraq&m=104326556329850&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/50104 http://www.entercept.com/news/uspr/01-22-03.asp http://www.kb.cert.org/vuls/id/850785 http://www.securityfocus.com/bid/6665 https://exchange.xforce.ibmcloud.com/vulnerabilities/11129 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A120 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A195 https: •

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 3

rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header. • https://www.exploit-db.com/exploits/22120 http://secunia.com/advisories/7825 http://sunsolve.sun.com/search/document.do?assetkey=1-26-51980-1 http://www.kb.cert.org/vuls/id/944241 http://www.securityfocus.com/archive/1/305105 http://www.securityfocus.com/bid/6509 http://www.securitytracker.com/id?1005882 http://www.securitytracker.com/id?1006682 https://exchange.xforce.ibmcloud.com/vulnerabilities/11608 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

pkgadd in Sun Solaris 2.5.1 through 8 installs files setuid/setgid root if the pkgmap file contains a "?" (question mark) in the (1) mode, (2) owner, or (3) group fields, which allows attackers to elevate privileges. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-45693-1 http://www.iss.net/security_center/static/9544.php http://www.securityfocus.com/bid/5208 •