Page 5 of 79 results (0.007 seconds)

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

09 Aug 1999 — sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. • http://www.securityfocus.com/bid/575 •

CVSS: 10.0EPSS: 5%CPEs: 9EXPL: 2

01 Jul 1999 — Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 •

CVSS: 9.1EPSS: 6%CPEs: 8EXPL: 1

07 Jun 1999 — rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

10 Feb 1999 — In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files. • http://www.securityfocus.com/bid/165 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 1

07 Jan 1999 — Solaris ff.core allows local users to modify files. • https://www.exploit-db.com/exploits/19258 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

17 Dec 1998 — The passwd command in Solaris can be subjected to a denial of service. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/182 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

12 Dec 1998 — Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access. • http://www.osvdb.org/8205 •

CVSS: 9.8EPSS: 1%CPEs: 8EXPL: 0

31 Aug 1998 — Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/181 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

01 Aug 1998 — Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0339 •

CVSS: 7.5EPSS: 3%CPEs: 9EXPL: 1

16 Jul 1998 — Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges. • https://www.exploit-db.com/exploits/19126 •