Page 39 of 391 results (0.008 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in NFS on Solaris 2.5.1 through Solaris 9 allows an NFS client to cause a denial of service by killing the lockd daemon. • http://marc.info/?l=bugtraq&m=103487058823193&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-47815-1 http://www.iss.net/security_center/static/10394.php http://www.kb.cert.org/vuls/id/855635 http://www.securityfocus.com/bid/5986 •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 0

Multiple format string vulnerabilities in in.rarpd (ARP server) on Solaris, Caldera UnixWare and Open UNIX, and possibly other operating systems, allows remote attackers to execute arbitrary code via format strings that are not properly handled in the functions (1) syserr and (2) error. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.29/CSSA-2002-SCO.29.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0074.html http://online.securityfocus.com/archive/1/273584 http://www.iss.net/security_center/static/9150.php http://www.securityfocus.com/bid/4791 •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 0

Multiple buffer overflows in in.rarpd (ARP server) on Solaris, and possibly other operating systems including Caldera UnixWare and Open UNIX, allow remote attackers to execute arbitrary code, possibly via the functions (1) syserr and (2) error. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.29/CSSA-2002-SCO.29.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0074.html http://online.securityfocus.com/archive/1/273584 http://www.iss.net/security_center/static/9150.php http://www.securityfocus.com/bid/4791 •

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •

CVSS: 10.0EPSS: 82%CPEs: 10EXPL: 4

Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P http://archives.neohapsis.com/archives/aix/2002-q4/0002.html http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html http://archives.neohapsis.com/archives/hp/2002-q3/0077.html http://bvl • CWE-190: Integer Overflow or Wraparound •