Page 50 of 619 results (0.008 seconds)

CVSS: 9.8EPSS: 74%CPEs: 6EXPL: 1

03 Jul 2002 — Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0049.html •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 3

11 Jun 2002 — FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files. • https://www.exploit-db.com/exploits/21407 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 1

11 Jun 2002 — sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter. • https://www.exploit-db.com/exploits/21340 •

CVSS: 10.0EPSS: 48%CPEs: 8EXPL: 1

29 May 2002 — Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name. Desbordamiento de montón (heap) en la función cfsd_calloc de Solaris cachefsd permite a atacantes remotos ejecutar código arbitrario mediante una petición con nombres de directorio y de caché largos. • https://www.exploit-db.com/exploits/21437 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 2

02 Apr 2002 — Buffer overflow in Xsun on Solaris 2.6 through 8 allows local users to gain root privileges via a long -co (color database) command line argument. Desbordamiento de buffer en XSun sobre Solaris 2.6 a 8 permite a un usuario local obtener privilegios de root mediante un argumento -co largo de linea de comandos. • https://www.exploit-db.com/exploits/21360 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

15 Mar 2002 — Buffer overflow in Low BandWidth X proxy (lbxproxy) in Solaris 8 allows local users to execute arbitrary code via a long display command line option. Desbordamiento de buffer en lbxprosy en Solaris 8 permite a usuarios locales ejecutar código arbitrario mediante una opción 'display' de línea de comandos larga. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0041.html •

CVSS: 7.5EPSS: 2%CPEs: 4EXPL: 0

07 Mar 2002 — cachefsd in Solaris 2.6, 7, and 8 allows remote attackers to cause a denial of service (crash) via an invalid procedure call in an RPC request. cachefsd en Solaris 2.6, 7 y 8 permite a atacantes remotos causar una denegación de servicio (caída) mediante una llamada a procedimiento inválida en una petición RPC. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0047.html •

CVSS: 7.8EPSS: 4%CPEs: 4EXPL: 0

07 Mar 2002 — Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument. Desbordamiento de Buffer en cachefsd en Solaris 2.6, 7 y 8 permite a usarios locales ganar privilegios de root mediante un argumento de mount largo. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00416.html •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

07 Mar 2002 — Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file. Desbordamiento de buffer en admintools en Solarios 2.5 a 8 permite a usuarios locales ganar privilegios de root mediante argumentos largos ala opción de línea de comandos -del argumento PRODVERS en el fichero .cdtoc. • http://online.securityfocus.com/archive/1/270122 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

07 Mar 2002 — Buffer overflow in admintool in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long media installation path. Desbordamiento de buffer en admintool en Solaris 2.6, 7 y 8 permite a usuarios locales ganar privilegios de root mediante una ruta de instalación de medio larga. • http://www.esecurityonline.com/advisories/eSO4123.asp •