Page 39 of 199 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 2

Buffer overflow in whodo in Solaris SunOS 5.5.1 through 5.8 allows local users to execute arbitrary code via a long (1) SOR or (2) CFIME environment variable. • https://www.exploit-db.com/exploits/20974 http://archives.neohapsis.com/archives/bugtraq/2001-07/0076.html http://www.securityfocus.com/bid/2935 https://exchange.xforce.ibmcloud.com/vulnerabilities/6802 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A34 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A47 •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings. • http://www.cert.org/advisories/CA-2001-07.html http://www.nai.com/research/covert/advisories/048.asp http://www.securityfocus.com/bid/2550 https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

Buffer overflow in dtsession on Solaris, and possibly other operating systems, allows local users to gain privileges via a long LANG environmental variable. • https://www.exploit-db.com/exploits/20766 http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html •

CVSS: 10.0EPSS: 78%CPEs: 6EXPL: 2

Buffer overflow in Solaris snmpXdmid SNMP to DMI mapper daemon allows remote attackers to execute arbitrary commands via a long "indication" event. • https://www.exploit-db.com/exploits/20648 https://www.exploit-db.com/exploits/20649 http://marc.info/?l=bugtraq&m=98462536724454&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/207 http://www.cert.org/advisories/CA-2001-05.html http://www.ciac.org/ciac/bulletins/l-065.shtml http://www.securityfocus.com/bid/2417 https://exchange.xforce.ibmcloud.com/vulnerabilities/6245 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 3

Buffer overflow in ximp40 shared library in Solaris 7 and Solaris 8 allows local users to gain privileges via a long "arg0" (process name) argument. • https://www.exploit-db.com/exploits/20603 http://archives.neohapsis.com/archives/bugtraq/2001-01/0517.html http://www.securityfocus.com/bid/2322 https://exchange.xforce.ibmcloud.com/vulnerabilities/6039 •