Page 48 of 391 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in exrecover in Solaris 2.6 and earlier possibly allows local users to gain privileges via a long command line argument. • http://marc.info/?l=bugtraq&m=97908386502156&w=2 http://www.securityfocus.com/bid/2179 https://exchange.xforce.ibmcloud.com/vulnerabilities/5913 •

CVSS: 1.2EPSS: 0%CPEs: 2EXPL: 4

catman in Solaris 2.7 and 2.8 allows local users to overwrite arbitrary files via a symlink attack on the sman_PID temporary file. • https://www.exploit-db.com/exploits/235 https://www.exploit-db.com/exploits/20520 https://www.exploit-db.com/exploits/20521 https://www.exploit-db.com/exploits/233 http://archives.neohapsis.com/archives/bugtraq/2000-12/0313.html http://www.osvdb.org/6024 https://exchange.xforce.ibmcloud.com/vulnerabilities/5788 •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 1

patchadd in Solaris allows local users to overwrite arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/20514 http://marc.info/?l=bugtraq&m=97720205217707&w=2 http://www.securityfocus.com/bid/2127 https://exchange.xforce.ibmcloud.com/vulnerabilities/5789 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 5

Heap overflow in savestr function in LBNL traceroute 1.4a5 and earlier allows a local user to execute arbitrary commands via the -g option. • https://www.exploit-db.com/exploits/20250 https://www.exploit-db.com/exploits/20251 https://www.exploit-db.com/exploits/20252 https://www.exploit-db.com/exploits/178 http://archives.neohapsis.com/archives/bugtraq/2000-09/0344.html http://archives.neohapsis.com/archives/bugtraq/2000-09/0357.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-034.0.txt http://www.debian.org/security/2000/20001013 http://www.linux-mandrake.com/en/security/MDKSA-2000-053. •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 https://www.exploit-db.com/exploits/209 https://www.exploit-db.com/exploits/215 https://www.exploit-db.com/exploits/249 https://www.exploit-db.com/exploits/20185 https://www.exploit-db.com/exploits/210 https://www.exploit-db.com/exploits/20188 https://www.exploit-db.com/exploits/20186 https://www.exploit-db.com/exploits/197 https://www.exploit-db.com/exploits/20189 https://www.exploit-db.com/exploits/20190 ftp: • CWE-264: Permissions, Privileges, and Access Controls •