Page 4 of 81 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The (1) rcS and (2) mountall programs in Sun Solaris 2.x, possibly before 2.4, start a privileged shell on the system console if fsck fails while the system is booting, which allows attackers with physical access to gain root privileges. • http://sunsolve.sun.com/search/document.do?assetkey=1-22-00124-1 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

loadmodule in SunOS 4.1.x, as used by xnews, does not properly sanitize its environment, which allows local users to gain privileges, a different vulnerability than CVE-1999-1584. • http://www.cert.org/advisories/CA-1995-12.html http://www.ciac.org/ciac/bulletins/g-02.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/498 •

CVSS: 7.5EPSS: 1%CPEs: 33EXPL: 0

The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.ciac.org/ciac/bulletins/k-001.shtml http://www.securityfocus.com/bid/637 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 2

Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 https://www.exploit-db.com/exploits/19421 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188 http://www.ciac.org/ciac/bulletins/j-051.shtml http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102 •