Page 5 of 30 results (0.014 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 bits in a 32 bit UID, which allows a local user to gain root access if the lower 16 bits are set to 0, as fixed by the NFS jumbo patch upgrade. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/117&type=0&nav=sec.sba http://www.cert.org/advisories/CA-1992-15.html http://www.securityfocus.com/bid/47 https://exchange.xforce.ibmcloud.com/vulnerabilities/82 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in integer multiplication emulation code on SPARC architectures for SunOS 4.1 through 4.1.2 allows local users to gain root access or cause a denial of service (crash). • http://www.cert.org/advisories/CA-1992-15.html http://www.iss.net/security_center/static/7150.php http://www.securityfocus.com/bid/49 •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Denial of service by sending forged ICMP unreachable packets. • https://www.cve.org/CVERecord?id=CVE-1999-0214 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

SunOS 4.1.2 and earlier allows local users to gain privileges via "LD_*" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116 http://www.cert.org/advisories/CA-1992-11.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3152 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •