Page 5 of 129 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Multiple buffer overflows in the enable command for SCO OpenServer 5.0.6 and 5.0.7 allow local users to execute arbitrary code via long command line arguments. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.13/SCOSA-2005.13.txt http://www.securityfocus.com/bid/12474 https://exchange.xforce.ibmcloud.com/vulnerabilities/19243 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

The scosession program in OpenServer 5.0.6 and 5.0.7 allows local users to gain privileges via crafted strings on the commandline. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.5/SCOSA-2005.5.txt http://secunia.com/advisories/14012 http://www.kb.cert.org/vuls/id/972598 http://www.securityfocus.com/bid/12372 https://exchange.xforce.ibmcloud.com/vulnerabilities/19479 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The NFS mountd service on SCO UnixWare 7.1.1, 7.1.3, 7.1.4, and 7.0.1, and possibly other versions, when run from inetd, allows remote attackers to cause a denial of service (memory exhaustion) via a series of requests, which causes inetd to launch a separate process for each request. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.1/SCOSA-2005.1.txt http://secunia.com/advisories/13805 http://www.securityfocus.com/archive/1/386814 http://www.securityfocus.com/bid/12225 •

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 1

SCO OpenServer 5.0.5 through 5.0.7 only supports Xauthority style access control when users log in using scologin, which allows remote attackers to gain unauthorized access to an X session via other X login methods. • https://www.exploit-db.com/exploits/20851 http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0424.html http://www.securityfocus.com/advisories/6684 https://exchange.xforce.ibmcloud.com/vulnerabilities/16113 •

CVSS: 7.5EPSS: 4%CPEs: 68EXPL: 0

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1 http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/539110 http://www.us-cert.gov/cas/techalerts/TA05-136A.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11175 https: •