Page 6 of 110 results (0.013 seconds)

CVSS: 10.0EPSS: 70%CPEs: 22EXPL: 0

05 Sep 2002 — Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 •

CVSS: 10.0EPSS: 4%CPEs: 10EXPL: 4

12 Aug 2002 — Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt • CWE-190: Integer Overflow or Wraparound •

CVSS: 10.0EPSS: 2%CPEs: 7EXPL: 0

26 Jul 2002 — Format string vulnerability in the logging component of snmpdx for Solaris 5.6 through 8 allows remote attackers to gain root privileges. • http://marc.info/?l=bugtraq&m=102321107714554&w=2 •

CVSS: 10.0EPSS: 4%CPEs: 7EXPL: 0

26 Jul 2002 — Buffer overflow in the MIB parsing component of mibiisa for Solaris 5.6 through 8 allows remote attackers to gain root privileges. • http://marc.info/?l=bugtraq&m=102321107714554&w=2 •

CVSS: 7.2EPSS: 0%CPEs: 47EXPL: 0

23 Jul 2002 — CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure. El servidor de bases de datos CDE ToolTalk (ttdbserver) permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque en enlaces simbólicos (symlink attack) en el fichero de registro (log) de transacciones usado por el procedimiento RPC _TT_TRANSACTION • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt •

CVSS: 9.8EPSS: 47%CPEs: 6EXPL: 1

03 Jul 2002 — Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0049.html •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 3

11 Jun 2002 — FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files. • https://www.exploit-db.com/exploits/21407 •

CVSS: 10.0EPSS: 55%CPEs: 8EXPL: 1

29 May 2002 — Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name. Desbordamiento de montón (heap) en la función cfsd_calloc de Solaris cachefsd permite a atacantes remotos ejecutar código arbitrario mediante una petición con nombres de directorio y de caché largos. • https://www.exploit-db.com/exploits/21437 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 2

02 Apr 2002 — Buffer overflow in Xsun on Solaris 2.6 through 8 allows local users to gain root privileges via a long -co (color database) command line argument. Desbordamiento de buffer en XSun sobre Solaris 2.6 a 8 permite a un usuario local obtener privilegios de root mediante un argumento -co largo de linea de comandos. • https://www.exploit-db.com/exploits/21360 •

CVSS: 7.8EPSS: 3%CPEs: 4EXPL: 0

07 Mar 2002 — Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument. Desbordamiento de Buffer en cachefsd en Solaris 2.6, 7 y 8 permite a usarios locales ganar privilegios de root mediante un argumento de mount largo. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00416.html •