Page 5 of 62 results (0.007 seconds)

CVSS: 7.5EPSS: 1%CPEs: 33EXPL: 0

The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.ciac.org/ciac/bulletins/k-001.shtml http://www.securityfocus.com/bid/637 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. • http://www.securityfocus.com/bid/575 http://www.securityfocus.com/templates/archive.pike?list=1&msg=19990809134220.A1191%40hades.chaoz.org •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 2

Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 https://www.exploit-db.com/exploits/19421 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188 http://www.ciac.org/ciac/bulletins/j-051.shtml http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102 •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 1

rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 http://marc.info/?l=bugtraq&m=91547759121289&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba http://www.cert.org/advisories/CA-99-05-statd-automountd.html http://www.ciac.org/ciac/bulletins/j-045.shtml http://www.securityfocus.com/bid/450 •