Page 4 of 90 results (0.015 seconds)

CVSS: 7.5EPSS: 2%CPEs: 12EXPL: 0

Buffer overflow in ypbind daemon in Solaris 5.4 through 8 allows remote attackers to execute arbitrary code. • ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2001.03 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/203 http://www.ciac.org/ciac/bulletins/l-103.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/6828 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1844 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20684 http://archives.neohapsis.com/archives/bugtraq/2001-03/0394.html http://www.securityfocus.com/bid/2475 https://exchange.xforce.ibmcloud.com/vulnerabilities/6284 •

CVSS: 6.4EPSS: 3%CPEs: 2EXPL: 2

FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. • https://www.exploit-db.com/exploits/20764 http://www.securityfocus.com/archive/1/177200 http://www.securityfocus.com/bid/2601 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0). • http://marc.info/?l=bugtraq&m=97983943716311&w=2 http://marc.info/?l=bugtraq&m=98028642319440&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6224 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 2

Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter. • https://www.exploit-db.com/exploits/250 http://marc.info/?l=bugtraq&m=97934312727101&w=2 http://marc.info/?l=bugtraq&m=97957435729702&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/200&type=0&nav=sec.sba http://www.securityfocus.com/bid/2193 https://exchange.xforce.ibmcloud.com/vulnerabilities/5928 •