Page 35 of 194 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 5

Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option. • https://www.exploit-db.com/exploits/19872 https://www.exploit-db.com/exploits/19873 https://www.exploit-db.com/exploits/19874 http://archives.neohapsis.com/archives/bugtraq/2000-04/0192.html http://archives.neohapsis.com/archives/bugtraq/2000-04/0236.html http://marc.info/?l=bugtraq&m=95729763119559&w=2 http://www.securityfocus.com/bid/1138 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. • http://www.securityfocus.com/bid/918 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 3

/usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option. • https://www.exploit-db.com/exploits/2242 http://secunia.com/advisories/19426 http://securitytracker.com/id?1015833 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102215-1 http://www.osvdb.org/24200 http://www.securityfocus.com/bid/19662 http://www.sunmanagers.org/archives/1996/1383.html http://www.vupen.com/english/advisories/2006/1123 https://exchange.xforce.ibmcloud.com/vulnerabilities/25460 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval •

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 5

Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request. • https://www.exploit-db.com/exploits/19668 https://www.exploit-db.com/exploits/19670 https://www.exploit-db.com/exploits/19672 https://www.exploit-db.com/exploits/19669 https://www.exploit-db.com/exploits/213 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/191 http://www.osvdb.org/2558 http://www.securityfocus.com/bid/2354 http://www.securityfocus.com/bid/866 •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190 http://www.securityfocus.com/bid/864 •