Page 4 of 25 results (0.007 seconds)

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba http://www.ciac.org/ciac/bulletins/e-01.shtml http://www.osvdb.org/6436 https://exchange.xforce.ibmcloud.com/vulnerabilities/549 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 http://www.iss.net/security_center/static/7480.php •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

SunOS 4.1.2 and earlier allows local users to gain privileges via "LD_*" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116 http://www.cert.org/advisories/CA-1992-11.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3152 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in in.telnetd in SunOS 4.1.1 and earlier allows local users to gain root privileges. • http://www.cert.org/advisories/CA-1991-02.html https://exchange.xforce.ibmcloud.com/vulnerabilities/574 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in /bin/mail in SunOS 4.1.1 and earlier allows local users to gain root privileges via certain command line arguments. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/105 http://www.cert.org/advisories/CA-91.01a.SunOS.mail.vulnerability http://www.securityfocus.com/bid/15 •