Page 4 of 66 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

10 Mar 2000 — Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of service. • ftp://ftp.sco.com/SSE/security_bulletins/SB-00.08a •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 2

16 Feb 2000 — The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19752 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

15 Feb 2000 — ARCserve agent in SCO UnixWare 7.x allows local attackers to gain root privileges via a symlink attack. • https://www.exploit-db.com/exploits/19752 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

08 Feb 2000 — Vulnerability in SCO cu program in UnixWare 7.x allows local users to gain privileges. • http://www.securityfocus.com/bid/1019 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

27 Jan 2000 — Buffer overflow in SCO scohelp program allows remote attackers to execute commands. • ftp://ftp.sco.com/SSE/security_bulletins/SB-00.02a •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

18 Jan 2000 — Buffer overflow in UnixWare ppptalk command allows local users to gain privileges via a long prompt argument. • http://marc.info/?l=bugtraq&m=94848865112897&w=2 •

CVSS: 7.8EPSS: 18%CPEs: 4EXPL: 1

04 Jan 2000 — Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19501 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

04 Jan 2000 — The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed. • https://www.exploit-db.com/exploits/19674 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

30 Dec 1999 — Buffer overflow in UnixWare rtpm program allows local users to gain privileges via a long environmental variable. • http://marc.info/?l=bugtraq&m=94908470928258&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Dec 1999 — UnixWare pis and mkpis commands allow local users to gain privileges via a symlink attack. • http://marc.info/?l=bugtraq&m=94780294009285&w=2 •