Page 38 of 199 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

Buffer overflow in mail included with SunOS 5.8 for x86 allows a local user to gain privileges via a long HOME environment variable. • http://archives.neohapsis.com/archives/bugtraq/2001-06/0000.html http://www.securityfocus.com/bid/2819 https://exchange.xforce.ibmcloud.com/vulnerabilities/6638 •

CVSS: 4.6EPSS: 0%CPEs: 15EXPL: 3

Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option. • https://www.exploit-db.com/exploits/20772 https://www.exploit-db.com/exploits/20773 http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html http://online.securityfocus.com/archive/1/184210 http://www.kb.cert.org/vuls/id/446864 http://www.securityfocus.com/bid/2610 https://exchange.xforce.ibmcloud.com/vulnerabilities/8246 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

Buffer overflow in the Xview library as used by mailtool in Solaris 8 and earlier allows a local attacker to gain privileges via the OPENWINHOME environment variable. • https://www.exploit-db.com/exploits/20885 http://archives.neohapsis.com/archives/bugtraq/2001-05/0258.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6626 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 4

kcms_configure as included with Solaris 7 and 8 allows a local attacker to gain additional privileges via a buffer overflow in a command line argument. • https://www.exploit-db.com/exploits/20740 https://www.exploit-db.com/exploits/20741 http://archives.neohapsis.com/archives/bugtraq/2001-04/0140.html http://www.securityfocus.com/bid/2558 https://exchange.xforce.ibmcloud.com/vulnerabilities/6359 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A65 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in the line printer daemon (in.lpd) for Solaris 8 and earlier allows local and remote attackers to gain root privileges via a "transfer job" routine. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/206 http://www.cert.org/advisories/CA-2001-15.html http://www.securityfocus.com/bid/2894 http://xforce.iss.net/alerts/advise80.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6718 •