Page 5 of 145 results (0.011 seconds)

CVSS: 9.8EPSS: 0%CPEs: 91EXPL: 0

03 Mar 2003 — The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

28 Feb 2003 — The FTP client for Solaris 2.6, 7, and 8 with the debug (-d) flag enabled displays the user password on the screen during login. • http://secunia.com/advisories/8186 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

18 Feb 2003 — Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. • http://secunia.com/advisories/8092 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

11 Feb 2003 — Unknown vulnerability in mail for Solaris 2.6 through 9 allows local users to read the email of other users. • http://secunia.com/advisories/8058 •

CVSS: 7.5EPSS: 65%CPEs: 10EXPL: 1

07 Feb 2003 — Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure. Vulnerabilidad de atravesamiento de directorios en el demonio servidor de Sun Kodak Color Management System (KMCS) (kcms_server) permite a atacantes remotos leer ficheros arbitrarios mediante el procedimiento KCS_OPEN_PROFILE • https://packetstorm.news/files/id/180772 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

27 Jan 2003 — Unknown vulnerability in the FTP server (in.ftpd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (temporary FTP server hang), which affects other active mode FTP clients. • http://secunia.com/advisories/7968 •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 3

03 Jan 2003 — rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header. • https://www.exploit-db.com/exploits/22120 •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

31 Dec 2002 — pkgadd in Sun Solaris 2.5.1 through 8 installs files setuid/setgid root if the pkgmap file contains a "?" (question mark) in the (1) mode, (2) owner, or (3) group fields, which allows attackers to elevate privileges. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-45693-1 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

31 Dec 2002 — Buffer overflow in Volume Manager daemon (vold) of Sun Solaris 2.5.1 through 8 allows local users to execute arbitrary code via unknown attack vectors. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F45707 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

31 Dec 2002 — Unknown vulnerability in the System Serial Console terminal in Solaris 2.5.1, 2.6, and 7 allows local users to monitor keystrokes and possibly steal sensitive information. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F45502 •