Page 38 of 243 results (0.014 seconds)

CVSS: 10.0EPSS: 9%CPEs: 76EXPL: 2

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 10.0EPSS: 4%CPEs: 31EXPL: 2

Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 https://www.exploit-db.com/exploits/19101 ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX http://www.securityfocus.com/bid/122 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

inetd in AIX 4.1.5 dynamically assigns a port N when starting ttdbserver (ToolTalk server), but also inadvertently listens on port N-1 without passing control to ttdbserver, which allows remote attackers to cause a denial of service via a large number of connections to port N-1, which are not properly closed by inetd. • http://marc.info/?l=bugtraq&m=89025820612530&w=2 •

CVSS: 1.2EPSS: 0%CPEs: 9EXPL: 0

sadc in IBM AIX 4.1 through 4.3, when called from programs such as timex that are setgid adm, allows local users to overwrite arbitrary files via a symlink attack. • http://techsupport.services.ibm.com/aix/fixes/v4/os/bos.acct.4.3.1.0.info http://www-1.ibm.com/support/search.wss?rs=0&q=IX75554&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IX76330&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IX76853&apar=only http://www.securityfocus.com/bid/408 https://exchange.xforce.ibmcloud.com/vulnerabilities/7675 •