Page 30 of 214 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in uustat in Sun Solaris 8 and 9 allows local users to execute arbitrary code via a long -S command line argument. • http://secunia.com/advisories/18371 http://secunia.com/advisories/19087 http://securitytracker.com/id?1015455 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101933-1 http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm http://www.idefense.com/intelligence/vulnerabilities/display.php?id=366 http://www.securityfocus.com/bid/16193 http://www.vupen.com/english/advisories/2006/0113 https://exchange.xforce.ibmcloud.com/vulnerabilities/24045 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

Sun Solaris 7 through 9, when Basic Security Module (BSM) is enabled and the SUNWscpu package has been removed as a result of security hardening, disables mail alerts from the audit_warn script, which might allow attackers to escape detection. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57483-1 http://www.ciac.org/ciac/bulletins/o-070.shtml http://www.securityfocus.com/bid/13724 https://exchange.xforce.ibmcloud.com/vulnerabilities/15042 •

CVSS: 7.5EPSS: 4%CPEs: 68EXPL: 0

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1 http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/539110 http://www.us-cert.gov/cas/techalerts/TA05-136A.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11175 https: •

CVSS: 10.0EPSS: 29%CPEs: 6EXPL: 0

Unknown vulnerability in the rwho daemon (in.rwhod) for Solaris 7 through 9 allows remote attackers to execute arbitrary code. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57659-1&searchclause=%22category:security%22%20%22availability%2C%20security%22 http://www.auscert.org.au/render.html?it=4597 http://www.ciac.org/ciac/bulletins/p-050.shtml http://www.securityfocus.com/bid/11840 https://exchange.xforce.ibmcloud.com/vulnerabilities/18385 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A592 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in the ping daemon of Sun Solaris 7 through 9 may allow local users to execute arbitrary code. • http://secunia.com/advisories/13340 http://securitytracker.com/id?1012368 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57675-1&searchclause=%22category:security%22%20%22availability%2C%20security%22 http://www.auscert.org.au/render.html?it=4586 http://www.ciac.org/ciac/bulletins/p-045.shtml http://www.osvdb.org/displayvuln.php?osvdb_id=12168 http://www.securityfocus.com/bid/11782 https://exchange.xforce.ibmcloud.com/vulnerabilities/18310 https://oval.cisecurity.org/repositor •