Page 37 of 199 results (0.008 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 1

pt_chmod in Solaris 8 does not call fdetach to reset terminal privileges when users log out of terminals, which allows local users to write to other users' terminals by modifying the ACL of a TTY. • http://securitytracker.com/id?1002732 http://securitytracker.com/id?1004035 http://sunsolve.sun.com/search/document.do?assetkey=1-26-43929-1 http://www.securityfocus.com/bid/3522 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 4

Buffer overflow in the LDAP naming services library (libsldap) in Sun Solaris 8 allows local users to execute arbitrary code via a long LDAP_OPTIONS environment variable to a privileged program that uses libsldap. • https://www.exploit-db.com/exploits/20970 https://www.exploit-db.com/exploits/20969 http://seclists.org/bugtraq/2001/Jul/0077.html http://seclists.org/bugtraq/2001/Jul/0091.html http://seclists.org/bugtraq/2001/Jun/0365.html http://www.securiteam.com/unixfocus/5IP0O2A4KS.html http://www.securityfocus.com/bid/2931 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 97%CPEs: 43EXPL: 9

Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •

CVSS: 10.0EPSS: 19%CPEs: 6EXPL: 3

Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username. Desbordamiento de buffer en rpc.yppasswdd (servidor de yppasswd) en Solaris 2.6, 7 y 8 permite a atacantes remotos obtener acceso de root mediante un nombre de usuario largo. • https://www.exploit-db.com/exploits/20879 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/209 http://www.ciac.org/ciac/bulletins/m-008.shtml http://www.kb.cert.org/vuls/id/327281 http://www.securityfocus.com/archive/1/187086 http://www.securityfocus.com/archive/1/200110041632.JAA28125%40dim.ucsd.edu http://www.securityfocus.com/bid/2763 https://exchange.xforce.ibmcloud.com/vulnerabilities/6629 https://oval.cisecurity.org/repository/search/definition/oval%3 •

CVSS: 7.5EPSS: 3%CPEs: 8EXPL: 0

The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-40521-1 http://www.securityfocus.com/bid/7396 https://exchange.xforce.ibmcloud.com/vulnerabilities/11841 •