Page 4 of 30 results (0.004 seconds)

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 1

passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument. • http://www.dataguard.no/bugtraq/1994_4/0755.html http://www2.dataguard.no/bugtraq/1994_2/0197.html http://www2.dataguard.no/bugtraq/1994_2/0207.html •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/126 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba http://www.ciac.org/ciac/bulletins/e-01.shtml http://www.osvdb.org/6436 https://exchange.xforce.ibmcloud.com/vulnerabilities/549 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 http://www.iss.net/security_center/static/7480.php •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash. • http://www.cert.org/advisories/CA-1993-03.html http://www.securityfocus.com/bid/59 https://exchange.xforce.ibmcloud.com/vulnerabilities/521 •