Page 5 of 141 results (0.006 seconds)

CVSS: 1.2EPSS: 0%CPEs: 8EXPL: 0

Race condition in Solaris 2.6 through 9 allows local users to cause a denial of service (kernel panic), as demonstrated via the namefs function, pipe, and certain STREAMS routines. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57080-1 http://www.securityfocus.com/bid/8836 https://exchange.xforce.ibmcloud.com/vulnerabilities/13434 •

CVSS: 10.0EPSS: 5%CPEs: 163EXPL: 0

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742 http://marc.info/?l=bugtraq&m=106381604923204&w=2 http://marc.info/?l=bugtraq&m=106382859407683&w=2 http://marc.info/?l=bugtraq&m=106383437615742&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

The patches (1) 105693-13, (2) 108800-02, (3) 105694-13, and (4) 108801-02 for cachefs on Solaris 2.6 and 7 overwrite the inetd.conf file, which may silently reenable services and allow remote attackers to bypass the intended security policy. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-56300-1 http://www.ciac.org/ciac/bulletins/n-134.shtml http://www.securityfocus.com/bid/8461 https://exchange.xforce.ibmcloud.com/vulnerabilities/12942 •

CVSS: 1.2EPSS: 0%CPEs: 8EXPL: 1

Unknown vulnerability in Solaris 2.6 through 9 causes a denial of service (system panic) via "a rare race condition" or an attack by local users. Vulnerabilidad desconocida en Solaris 2.6 a 9 causa una denegación de servicio (pánico de sistema) mediante "una rara condición de carrera" o un ataque de usuarios locales. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F47353 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4561 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

Stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 allows local users to gain root privileges via a long LD_PRELOAD environment variable. Desbordamiento basado en la pila en el enlazador de tiempo de ejecución, ld.so.1 en Solaris 2.6 a 9 permite a usuarios locales ganar privilegios de root mediante una variable de entorno LD_PRELOAD larga. • https://www.exploit-db.com/exploits/1182 https://www.exploit-db.com/exploits/114 http://marc.info/?l=bugtraq&m=105951760418667&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55680 http://www.idefense.com/advisory/07.29.03.txt http://www.osvdb.org/8722 https://exchange.xforce.ibmcloud.com/vulnerabilities/12755 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3601 •