Page 5 of 49 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

18 Apr 1996 — pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0078 •

CVSS: 10.0EPSS: 1%CPEs: 18EXPL: 0

19 Oct 1995 — Buffer overflow in syslog utility allows local or remote attackers to gain root privileges. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0099 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

23 Aug 1995 — SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html •

CVSS: 9.1EPSS: 1%CPEs: 5EXPL: 0

14 Feb 1994 — Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone. • http://www.securityfocus.com/bid/24 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

01 Oct 1993 — The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

17 Sep 1993 — /usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 1

03 Feb 1993 — Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash. • http://www.cert.org/advisories/CA-1993-03.html •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

04 Jun 1992 — The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

22 Oct 1991 — rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html •