Page 5 of 90 results (0.023 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in exrecover in Solaris 2.6 and earlier possibly allows local users to gain privileges via a long command line argument. • http://marc.info/?l=bugtraq&m=97908386502156&w=2 http://www.securityfocus.com/bid/2179 https://exchange.xforce.ibmcloud.com/vulnerabilities/5913 •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 https://www.exploit-db.com/exploits/209 https://www.exploit-db.com/exploits/215 https://www.exploit-db.com/exploits/249 https://www.exploit-db.com/exploits/20185 https://www.exploit-db.com/exploits/210 https://www.exploit-db.com/exploits/20188 https://www.exploit-db.com/exploits/20186 https://www.exploit-db.com/exploits/197 https://www.exploit-db.com/exploits/20189 https://www.exploit-db.com/exploits/20190 ftp: • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 26EXPL: 2

Buffer overflow in ufsrestore in Solaris 8 and earlier allows local users to gain root privileges via a long pathname. • https://www.exploit-db.com/exploits/20014 http://archives.neohapsis.com/archives/bugtraq/2000-06/0114.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/210 http://www.kb.cert.org/vuls/id/36866 http://www.osvdb.org/1398 http://www.securityfocus.com/bid/1348 https://exchange.xforce.ibmcloud.com/vulnerabilities/4711 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. • http://www.securityfocus.com/bid/918 •

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 5

Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request. • https://www.exploit-db.com/exploits/19668 https://www.exploit-db.com/exploits/19670 https://www.exploit-db.com/exploits/19672 https://www.exploit-db.com/exploits/19669 https://www.exploit-db.com/exploits/213 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/191 http://www.osvdb.org/2558 http://www.securityfocus.com/bid/2354 http://www.securityfocus.com/bid/866 •